NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Found Passwords from Not Found Lists - 700 md5( md5($pass) . $salt)


4 Results - Page 1 of 1 -
1
Author Message
Avatar
uzundz

Status: n/a
Joined: Wed, 12 Aug 2015
Posts: 23
Team:
Reputation: 0 Reputation
Offline
Thu, 19 Nov 2015 @ 21:41:50

hello all ,

if someone can crack them will be great

type pass : md5( md5($pass) . $salt)

seperator ( : )

http://pastebin.com/GGJkvfeV

thank you in advance


Avatar
Dutch

Status: n/a
Joined: Tue, 11 Aug 2015
Posts: 116
Team:
Reputation: 156 Reputation
Offline
Thu, 19 Nov 2015 @ 22:30:13


Hash type: vBulletin < v3.8.5

390 found

401 left

l+f: https://www.sendspace.com/filegroup/gwnRxQNyvnyKACezWbw8Ig


BTC 1G8R8Ny75drpYKRrxVY3vdiaFK2eie4UvH

Avatar
m3mb3r

Status: n/a
Joined: Sat, 09 Jan 2016
Posts: 4
Team:
Reputation: 0 Reputation
Offline
Mon, 11 Jan 2016 @ 05:54:05

Dutch said:


Hash type: vBulletin < v3.8.5

390 found

401 left

l+f: https://www.sendspace.com/filegroup/gwnRxQNyvnyKACezWbw8Ig

what use program you?
please program and wordlist for help?


Avatar
chris_leech

Status: n/a
Joined: Sat, 28 May 2016
Posts: 84
Team: Naught
Reputation: 90 Reputation
Offline
Sun, 26 Jun 2016 @ 15:36:20

I'm a bit late to the party but I found a few more:

Found: 528 ( + 138)

http://pastebin.com/yn6zXy1Z

Left:

http://pastebin.com/r50qkizw

As for the tools, oclhashcat with some bruteforce and wordlists with rules.

Wordlst are rockyou.txt (you can find it anywhere)
founds.txt (No idea where I got this)
hashkiller-dict (From this website)

and for the rules they were just the standard ones ( best64.rule, toggles1.rule)



4 Results - Page 1 of 1 -
1

We have a total of 180089 messages in 22341 topics.
We have a total of 20787 registered users.
Our newest registered member is Michaelcib.