12x GPU Monster For SALE by HashKiller Owner

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Unknown Hashes - Unknow Hash


6 Results - Page 1 of 1 -
1
Author Message
Avatar
mrspyro

Status: n/a
Joined: Tue, 30 Oct 2018
Posts: 4
Team:
Reputation: 0 Reputation
Offline
Tue, 30 Oct 2018 @ 21:53:03

I do not know the hash, and I would pay to crack it.

AAD7AFB6A6BAA6B8A1AEE5D1DED5A8DEACB6E3A3B4D7AAACAAA6E4B8E4ACABD9ADE5BDE3E7BED8BB99A29997969495919599969999A5A195919692A3A5929390

The password is Alonso80.


Avatar
Mr.EyeLidz

Status: n/a
Joined: Sun, 11 Mar 2018
Posts: 6
Team:
Reputation: 0 Reputation
Offline
Tue, 30 Oct 2018 @ 22:14:41

SHA512 possibly?


Current rig: i3, 4gb
Help Me Upgrade
BTC: 1JyDni5ep4Z5RWDorXSfTyvXyF8fgG9KaY

Avatar
mrspyro

Status: n/a
Joined: Tue, 30 Oct 2018
Posts: 4
Team:
Reputation: 0 Reputation
Offline
Wed, 31 Oct 2018 @ 01:01:11

Do not remind me, I do not really know what it is, the database is oracle and the web code is asp.


Avatar
nick8606

Status: Trusted
Joined: Sat, 18 May 2013
Posts: 170
Team:
Reputation: 188 Reputation
Online
Wed, 31 Oct 2018 @ 02:47:51

mrspyro, it's probably some kind of encoding/encryption, not a hash.
Can you make some experiments? Their results may help you to find algorithm.
1. Try to use the same passwords for different accounts. Will results be the same?
2. Try to use passwords with short size 1 and with long size >32. Will results have the same size or not?
3. Try to use incremental passwords with the same symbol ("0", "00", "000", etc.) and compare results. May be you will see dependencies.


BTC 1MMfrVTvP9dHw9eDbQ34XtDZ9Xcq34HEPP

Avatar
mrspyro

Status: n/a
Joined: Tue, 30 Oct 2018
Posts: 4
Team:
Reputation: 0 Reputation
Offline
Wed, 31 Oct 2018 @ 03:08:50

nick8606 said:

mrspyro, it's probably some kind of encoding/encryption, not a hash.
Can you make some experiments? Their results may help you to find algorithm.
1. Try to use the same passwords for different accounts. Will results be the same?
2. Try to use passwords with short size 1 and with long size >32. Will results have the same size or not?
3. Try to use incremental passwords with the same symbol ("0", "00", "000", etc.) and compare results. May be you will see dependencies.

You are absolutely right, all hash, are similar with the same password,

AAD7AFB6A6BAA6B8A1AEE5D1DED5A8DEACB6E3A3B4D7AAACAAA6E4B8E4ACABD9ADE5BDE3E7BED8BB99A29997969495919599969999A5A195919692A3A5929390: Alonso80.


ACA5DDE4A7ECA4ECA8AEB7A3B1A6DAA8ADBAB4D4B6A9AAA5AAA6E3EAE7B2AAADB1B4E5BBB4BBAAE699A29997969495919599969999A5A195919692A3A5929390: Dont know at the moment


AED4ACE6D6BAA9B8A5A8BAD4DCACA8DEA6E3B2D1E7A5A8ADA8D5B6B9B3DDD6DCACB4E8E4B8BDA3B999A29997969495919599969999A5A195919692A3A5929390: Dont know at the moment.


Avatar
mrspyro

Status: n/a
Joined: Tue, 30 Oct 2018
Posts: 4
Team:
Reputation: 0 Reputation
Offline
Wed, 21 Nov 2018 @ 21:26:00

help please?



6 Results - Page 1 of 1 -
1

We have a total of 201955 messages in 24886 topics.
We have a total of 22194 registered users.
Our newest registered member is edisone.