NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Unknown Hashes - unknow Please help

WARNING!
Due to the number of SCAMS going on in the PAID forum, PLEASE ask an ADMIN or MODERATOR to verify ALL found passwords to ensure you are not being SCAMMED.
DO NOT PAY until an ADMIN or MOD has verified them for you!


5 Results - Page 1 of 1 -
1
Author Message
Avatar
newusers111

Status: n/a
Joined: Wed, 07 Nov 2018
Posts: 9
Team:
Reputation: 0 Reputation
Offline
Wed, 07 Nov 2018 @ 15:38:34

thank you for advance


$2y$10$ZxTNgW/sbH5yZLc3/RDycOQ2MId1s/TE0lhJ8lX9Uyqgx7bZjQgXS
$2y$10$jr/JgcpkQ15VNT4lbO240OAmfJd5ZOZT.51IWBAhIlC3qbc5KMBau


Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2475
Team:
Reputation: 8260 Reputation
Offline
Wed, 07 Nov 2018 @ 16:00:22

Bcrypt hashes.
hashcat mode: 3200

From the wikipedia:

The prefix "$2a$" or "$2b$" (or "$2y$") in a hash string in a shadow password file indicates that hash string is a bcrypt hash in modular crypt format.[9] The rest of the hash string includes the cost parameter, a 128-bit salt (Radix-64 encoded as 22 characters), and 184 bits of the resulting hash value (Radix-64 encoded as 31 characters)[10]. The Radix-64 encoding uses the unix/crypt alphabet, and is not 'standard' Base-64[11][12]. The cost parameter specifies a key expansion iteration count as a power of two, which is an input to the crypt algorithm.

For example, the shadow password record 

Code:
$2a$10$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy
 specifies a cost parameter of 10, indicating 210 key expansion rounds. The salt is 
Code:
N9qo8uLOickgx2ZMRZoMye
 and the resulting hash is 
Code:
IjZAgcfl7p92ldGxad68LJZdL17lhWy
. Per standard practice, the user's password itself is not stored.

Source: https://en.wikipedia.org/wiki/Bcrypt


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
newusers111

Status: n/a
Joined: Wed, 07 Nov 2018
Posts: 9
Team:
Reputation: 0 Reputation
Offline
Thu, 08 Nov 2018 @ 22:42:23

can someone help me dehash it please


Avatar
pasnger57

Status: n/a
Joined: Tue, 11 Sep 2018
Posts: 103
Team:
Reputation: 67 Reputation
Online
Thu, 08 Nov 2018 @ 23:22:49

EEEP decryption that is a TALL order ... was testing that a wile back got only 20h/s on a GPU and my xenon was able to get 150h/s


Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2475
Team:
Reputation: 8260 Reputation
Offline
Fri, 09 Nov 2018 @ 17:24:33

Note: These hashes posted to the "Paid Password Recovery" thread.


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp


5 Results - Page 1 of 1 -
1

We have a total of 166876 messages in 20881 topics.
We have a total of 18730 registered users.
Our newest registered member is KelMayomb.