12x GPU Monster For SALE by HashKiller Owner

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Found Passwords from Not Found Lists - Some junk in md5 left file (0.txt)


3 Results - Page 1 of 1 -
1
Author Message
Avatar
Theatione

Status: Elite
Joined: Sun, 22 Feb 2015
Posts: 654
Team:
Reputation: 1623 Reputation
Offline
Sun, 01 May 2016 @ 14:48:01

Found some junk in the md5 left file (0.txt), such as:
a9b02c2e28c87f107397f70309ca3e2a:$HEX[0000004000000000000000000000000000000000000000]
89efa5fae7decc3151c9f741d2d10a0b:$HEX[0000000000000000000000400000000000000000000000000000000000]
60782b1f030c9a276a885d0747638a12:$HEX[200000000000000000000000000000000000000000000000000000]
3831bacacc1d5ddb31c2ab4af8ad517f:$HEX[00000000000000002000000000000000000000000000000000000000]
817166505f99a5227f676ce1ef2c5f13:$HEX[000000000000000000000100000000000000000000000000000000]
ba0d519e0e6d03ab9dc18f1a34a97584:$HEX[000000400000000000000000000000000000000000000000]
c1fcee1987a82ce21cec4bad2fb26e29:$HEX[0000000000000000000020000000000000]

Not sure what to do about those, but I though you might be interested to know


If you have large lists, please upload them to the Hash List Manager, it will be more practical for everybody. Thank you!

Avatar
deeznutty1

Status: n/a
Joined: Tue, 14 Jun 2016
Posts: 1
Team:
Reputation: 0 Reputation
Offline
Wed, 15 Jun 2016 @ 03:58:31

Theatione said:

Found some junk in the md5 left file (0.txt), such as:
a9b02c2e28c87f107397f70309ca3e2a:$HEX[0000004000000000000000000000000000000000000000]
89efa5fae7decc3151c9f741d2d10a0b:$HEX[0000000000000000000000400000000000000000000000000000000000]
60782b1f030c9a276a885d0747638a12:$HEX[200000000000000000000000000000000000000000000000000000]
3831bacacc1d5ddb31c2ab4af8ad517f:$HEX[00000000000000002000000000000000000000000000000000000000]
817166505f99a5227f676ce1ef2c5f13:$HEX[000000000000000000000100000000000000000000000000000000]
ba0d519e0e6d03ab9dc18f1a34a97584:$HEX[000000400000000000000000000000000000000000000000]
c1fcee1987a82ce21cec4bad2fb26e29:$HEX[0000000000000000000020000000000000]

Not sure what to do about those, but I though you might be interested to know


Avatar
Szul

Status: Elite
Joined: Sat, 15 Sep 2012
Posts: 1557
Team:
Reputation: 1452 Reputation
Offline
Wed, 15 Jun 2016 @ 05:34:57

this is not junk
passwords contain non-eng chars and thats the way of hashcat save cracked hashes
post marks inside [ ] in https://hashkiller.co.uk/bin-translator.aspx (hex field) and it will be converted to more humon readable format

example: first cracked hash - plain ���@�������������������


Jabber: Szul@jabb.im
4 x GTX 1080
TEAM HASHCAT


3 Results - Page 1 of 1 -
1

We have a total of 201936 messages in 24884 topics.
We have a total of 22192 registered users.
Our newest registered member is John:Smith.