NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - (Archived) Hash-Cracking Requests - 900 MD5 + Salt (not sure for hash type)


7 Results - Page 1 of 1 -
1
Author Message
Avatar
WhiteBird1

Status: n/a
Joined: Fri, 22 Jun 2018
Posts: 5
Team:
Reputation: 0 Reputation
Offline
Fri, 22 Jun 2018 @ 18:16:24


Hi

I'm sorry that I'm asking for help right after creating the account but help was the main reason why I created this account.

I hope I'll be enjoying and contributing to the community in future.

I have this list of MD5 Hashes (that's what they look like) + their salts with 3-4 digits.

I would like to get those hashes recovered/cracked if that is possible.

Any further info about what exactly is this hash type, is appreciated.

There is the list (HashKiller Paste):
https://paste.hashkiller.co.uk/5DlHN3Y_EeiA9kCNXEjIzQ

Thank you very much, you great community.

I tried to stick my the rules I hope I have not missed any.


Avatar
CrypticError

Status: Cracker
Joined: Tue, 03 Apr 2018
Posts: 349
Team: Hashdog
Reputation: 498 Reputation
Online
Fri, 22 Jun 2018 @ 18:25:24

tried:

vb < 3.8.5 (2611)
md5(pass salt)
md5(salt pass)
hmac md5(key = pass)
hmac md5(key = salt)

got nothing on top10mil

Where did these hashes come from?


+rep if I helped, thanks. Means a lot when I'm using power in China to crack hashes!

Hardware: 5x Titan X, 1x i7 4770k

Avatar
WhiteBird1

Status: n/a
Joined: Fri, 22 Jun 2018
Posts: 5
Team:
Reputation: 0 Reputation
Offline
Sun, 24 Jun 2018 @ 21:22:07

Hi

Sorry for replying late @CrypticError

I'm having this info now: I think the hashes are from PhpFox script but not really sure of version.

Hope that this info can help a tiny bit for any cracking results and thank you very much for your effort. +rep added


Avatar
gilles01

Status: n/a
Joined: Thu, 14 Sep 2017
Posts: 217
Team:
Reputation: 862 Reputation
Offline
Sun, 24 Jun 2018 @ 22:11:12

hastype is : md5(md5($sPassword) . md5($sSalt))
hashcat mode : 3910

After a quick run : 186 founds - 718


ETH : 0x8e2dbb8aa01a5da10adf7d97e637da37d19e5599
BTC : 1Ej7SXLUPfoTKWtH9aWjCEz7FmCrbWaJVS

Attachments: Login to view attachments.
Avatar
gilles01

Status: n/a
Joined: Thu, 14 Sep 2017
Posts: 217
Team:
Reputation: 862 Reputation
Offline
Sun, 24 Jun 2018 @ 22:47:08

+68
left 650


ETH : 0x8e2dbb8aa01a5da10adf7d97e637da37d19e5599
BTC : 1Ej7SXLUPfoTKWtH9aWjCEz7FmCrbWaJVS

Attachments: Login to view attachments.
Avatar
RalphG

Status: n/a
Joined: Mon, 16 Nov 2015
Posts: 268
Team:
Reputation: 483 Reputation
Offline
Mon, 25 Jun 2018 @ 02:06:37

+40 found


BTC: 16Zb7dArL1U6HRDHKFtUjK7EfLispRqs2

Attachments: Login to view attachments.
Avatar
WhiteBird1

Status: n/a
Joined: Fri, 22 Jun 2018
Posts: 5
Team:
Reputation: 0 Reputation
Offline
Wed, 27 Jun 2018 @ 19:18:12

gilles01 said:

+68
left 650

RalphG said:

+40 found

gilles01 said:

hastype is : md5(md5($sPassword) . md5($sSalt))
hashcat mode : 3910

After a quick run : 186 founds - 718

Sorry for replying late again
I'm thanking you all for helping for this. Many thanks. I now giving +REP to you three guys. Thanks.



7 Results - Page 1 of 1 -
1

We have a total of 187730 messages in 23274 topics.
We have a total of 21104 registered users.
Our newest registered member is pelerinor.