NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Unknown Hashes - unknow Please help


5 Results - Page 1 of 1 -
1
Author Message
Avatar
newusers111

Status: n/a
Joined: Wed, 07 Nov 2018
Posts: 9
Team:
Reputation: 0 Reputation
Offline
Wed, 07 Nov 2018 @ 15:38:34

thank you for advance


$2y$10$ZxTNgW/sbH5yZLc3/RDycOQ2MId1s/TE0lhJ8lX9Uyqgx7bZjQgXS
$2y$10$jr/JgcpkQ15VNT4lbO240OAmfJd5ZOZT.51IWBAhIlC3qbc5KMBau


Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2185
Team:
Reputation: 7462 Reputation
Offline
Wed, 07 Nov 2018 @ 16:00:22

Bcrypt hashes.
hashcat mode: 3200

From the wikipedia:

The prefix "$2a$" or "$2b$" (or "$2y$") in a hash string in a shadow password file indicates that hash string is a bcrypt hash in modular crypt format.[9] The rest of the hash string includes the cost parameter, a 128-bit salt (Radix-64 encoded as 22 characters), and 184 bits of the resulting hash value (Radix-64 encoded as 31 characters)[10]. The Radix-64 encoding uses the unix/crypt alphabet, and is not 'standard' Base-64[11][12]. The cost parameter specifies a key expansion iteration count as a power of two, which is an input to the crypt algorithm.

For example, the shadow password record 

Code:
$2a$10$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy
 specifies a cost parameter of 10, indicating 210 key expansion rounds. The salt is 
Code:
N9qo8uLOickgx2ZMRZoMye
 and the resulting hash is 
Code:
IjZAgcfl7p92ldGxad68LJZdL17lhWy
. Per standard practice, the user's password itself is not stored.

Source: https://en.wikipedia.org/wiki/Bcrypt


If I helped a +rep is appreciated!

BTC donation: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
newusers111

Status: n/a
Joined: Wed, 07 Nov 2018
Posts: 9
Team:
Reputation: 0 Reputation
Offline
Thu, 08 Nov 2018 @ 22:42:23

can someone help me dehash it please


Avatar
pasnger57

Status: n/a
Joined: Tue, 11 Sep 2018
Posts: 84
Team:
Reputation: 64 Reputation
Offline
Thu, 08 Nov 2018 @ 23:22:49

EEEP decryption that is a TALL order ... was testing that a wile back got only 20h/s on a GPU and my xenon was able to get 150h/s


Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2185
Team:
Reputation: 7462 Reputation
Offline
Fri, 09 Nov 2018 @ 17:24:33

Note: These hashes posted to the "Paid Password Recovery" thread.


If I helped a +rep is appreciated!

BTC donation: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp


5 Results - Page 1 of 1 -
1

We have a total of 160052 messages in 20116 topics.
We have a total of 18822 registered users.
Our newest registered member is Valyast.