12x GPU Monster For SALE by HashKiller Owner

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Found Passwords from Not Found Lists - How to deal with salted hashes in 0.txt


2 Results - Page 1 of 1 -
1
Author Message
Avatar
Chick3nman
Administrator
Status: Trusted
Joined: Wed, 28 Jan 2015
Posts: 580
Team:
Reputation: 602 Reputation
Online
Wed, 05 Oct 2016 @ 21:09:59

I have recovered a fairly large amount of hashes(~1million) from the "MD5" list on the list manager that are actually salted in a number of formats(2611, 2711, 2811, 10, 20).

How would i go about importing them? I'm somewhat certain that uploading them to the list manager is not going to work. Would splitting them into their respective algorithms work?


My PGP key is available for security and identity verification here: https://keybase.io/chick3nman

Hardware: 1x D-WAVE 2000Q

BTC: 1Chick3nMTco6sBEByKuvmAzYTBsGN5KzD

Avatar
Niko

Status: Elite
Joined: Sat, 16 May 2015
Posts: 1024
Team:
Reputation: 2754 Reputation
Online
Mon, 07 Nov 2016 @ 20:56:19

Yea, this is a pretty big issue. I would also like to know what to do about these.


+rep or ANY Donation Is Really Appreciated Thank You!

BTC: 14dBvuigXHaZmCAEsCm4DBbeCJBeQxN6ff
LTC: LKEeVrzivDgjJkSdkGb35vjc4vmLM7Agh8
ETH: 0x994b829c9fBf6f665c17a52517E3d005290C8eb4
BCH: qqngm26gwkcmfvldhyflhfksnd6flnlnrgmsytlkyp


2 Results - Page 1 of 1 -
1

We have a total of 201936 messages in 24884 topics.
We have a total of 22192 registered users.
Our newest registered member is John:Smith.