 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 311
Members: 0
Total: 311
|
|
|
|
|
 |
Full disclosure |
 |
Google Firebase hosting suspension / "malware distribution"bypass
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
rainbow tables |
 |
Posted: Tue Sep 29, 2009 3:05 pm |
|
|
lunarbeam |
Beginner |

 |
|
Joined: Sep 28, 2009 |
Posts: 3 |
|
|
|
 |
 |
 |
|
Hi guys,
i hope this is the right place to post this question.
I`m experiencing some rainbow crack 1.4 problems.
I`ve created a few rainbow tables:
md5_alpha#1-7_0_2100x8000000_all
md5_alpha#1-7_1_2100x8000000_all
md5_alpha#1-7_2_2100x8000000_all
md5_alpha#1-7_3_2100x8000000_all
md5_alpha-numeric#1-7_0_2100x8000000_all
md5_loweralpha#1-7_1_2100x8000000_all
md5_loweralpha-numeric#1-7_0_2100x8000000_all
md5_loweralpha-numeric#1-7_1_2100x8000000_all
md5_loweralpha-numeric#1-7_2_2100x8000000_all
I realise my tablebase is not complete.
Now, for example, relaying on the loweralpha-numeric table, if i try to crack something like test324 (in hash ofcourse) it works like a charm. But if i try a hash that should result hhhhhh7(or any other combination in this set and order - eg. gggggg4, yyyyyy3) it fails everytime.
What i`m interested in, is:
What are the extra tables that sould be made in order for the examples above to work.
Also, when i made a table that should crack a 10 characters password it couldn`t crack any 10, 9 or 8 character long ones.
eg. md5 alpha-numeric 1 10 0 2100 8000000 all
md5 alpha-numeric 1 10 1 2100 8000000 all
One last thing if you don`t mind.
What do the red numbers represent?
Excuse my bad english and thank you in advance. |
|
|
|
|
 |
 |
|
 |
Posted: Fri Oct 02, 2009 1:36 pm |
|
|
lunarbeam |
Beginner |

 |
|
Joined: Sep 28, 2009 |
Posts: 3 |
|
|
|
 |
 |
 |
|
|
|
|
|
Posted: Fri Oct 02, 2009 4:24 pm |
|
|
waraxe |
Site admin |

 |
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
 |
 |
 |
|
|
|
|
|
www.waraxe.us Forum Index -> Hash related information
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|