NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Found Passwords from Not Found Lists - How to deal with salted hashes in 0.txt


2 Results - Page 1 of 1 -
1
Author Message
Avatar
Chick3nman
Administrator
Status: Trusted
Joined: Wed, 28 Jan 2015
Posts: 576
Team:
Reputation: 602 Reputation
Offline
Wed, 05 Oct 2016 @ 21:09:59

I have recovered a fairly large amount of hashes(~1million) from the "MD5" list on the list manager that are actually salted in a number of formats(2611, 2711, 2811, 10, 20).

How would i go about importing them? I'm somewhat certain that uploading them to the list manager is not going to work. Would splitting them into their respective algorithms work?


My PGP key is available for security and identity verification here: https://keybase.io/chick3nman

Hardware: 1x D-WAVE 2000Q

BTC: 1Chick3nMTco6sBEByKuvmAzYTBsGN5KzD

Avatar
Niko

Status: Elite
Joined: Sat, 16 May 2015
Posts: 963
Team:
Reputation: 2666 Reputation
Offline
Mon, 07 Nov 2016 @ 20:56:19

Yea, this is a pretty big issue. I would also like to know what to do about these.


+rep or a tip is really appreciated if I helped

BTC: 14dBvuigXHaZmCAEsCm4DBbeCJBeQxN6ff
LTC: LKEeVrzivDgjJkSdkGb35vjc4vmLM7Agh8
ETH: 0x994b829c9fBf6f665c17a52517E3d005290C8eb4
BCH: qqngm26gwkcmfvldhyflhfksnd6flnlnrgmsytlkyp


2 Results - Page 1 of 1 -
1

We have a total of 188977 messages in 23444 topics.
We have a total of 21240 registered users.
Our newest registered member is socomfire.