NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Database Hashes - 13k HASH+SALT (MD5 OR MD4) | OLD from 2008~ | Need your help


4 Results - Page 1 of 1 -
1
Author Message
Avatar
paradox109

Status: n/a
Joined: Sat, 10 Mar 2018
Posts: 5
Team:
Reputation: 0 Reputation
Offline
Thu, 08 Nov 2018 @ 22:58:09

Hello everyone,

The list is 13k long with MD5(or not?) hashed passwords.

Insidepro could not crack a single one hash.

The list is from 2008~ and this is just 1/5 of the full DB for now.

Let me know if you manage to crack them

here is the link: https://paste.hashkiller.co.uk/b3mHN_OpEeiA_kCNXEjIzQ


Avatar
paradox109

Status: n/a
Joined: Sat, 10 Mar 2018
Posts: 5
Team:
Reputation: 0 Reputation
Offline
Fri, 09 Nov 2018 @ 19:23:00

*BUMP*

Any news? I really wonder what hashing Algorithm was used here. If any of you could help, would be awesome.


Avatar
blandyuk
Admin / Owner
Status: Trusted
Joined: Tue, 05 Jul 2011
Posts: 3011
Team: HashKiller
Reputation: 4040 Reputation
Offline
Fri, 09 Nov 2018 @ 19:48:51

You have a number of lines which are 65 hex chars, no : separator:

Code:
71190cab2c98289fa5a686bd07e45c7815785721d8bdc4e2753b703d7e323c73e
d31faae448d17468a96eeda7c53dc78424052213809592448aa4c1c0cfd58025a
801ff2e79986bb4375ac849d827f67845515218e70aba4fee50812352d948fdac
5e853603cc597914714bce945c04198822221384bce207a5647df1d0d7473e670
d78431275487800279ad8cae5e8cd882221991833fe130e726e5a20c624ad51de
f6faa3b2f31c1d7c5dbfd133d7022838822221911cdbdfe3196125292f84119b9
75605697cc684124bae2edf2690827802431910877d413be94f0a872bf728e11d
d914890dffc70d9f99e5f0b71ca99eb7860177178d0daa30c7d7b2b9f8a3018f1
6b2029984e7b00f211857eedf7d3d186100811329cf306a1fe6a892e5330baa96
84981f91adb0e6a82dc77fae193fa9c8129252140d583dd987320a064db71df66

This hints to me the database extraction was not done correctly. If you have DB dump, PM me the dump and I'll check...


Please read the forum rules | Please read the paid section rules
I accept private hash lists, with forum donations only.
BTC: 15qF9WUeFUD63ishxyAMiEgGqTcYzk4j9b
GPU Power: 9x GTX 1070 + 4x GTX 1080

Avatar
paradox109

Status: n/a
Joined: Sat, 10 Mar 2018
Posts: 5
Team:
Reputation: 0 Reputation
Offline
Fri, 09 Nov 2018 @ 22:15:00

blandyuk said:

You have a number of lines which are 65 hex chars, no : separator:

Code:
71190cab2c98289fa5a686bd07e45c7815785721d8bdc4e2753b703d7e323c73e
d31faae448d17468a96eeda7c53dc78424052213809592448aa4c1c0cfd58025a
801ff2e79986bb4375ac849d827f67845515218e70aba4fee50812352d948fdac
5e853603cc597914714bce945c04198822221384bce207a5647df1d0d7473e670
d78431275487800279ad8cae5e8cd882221991833fe130e726e5a20c624ad51de
f6faa3b2f31c1d7c5dbfd133d7022838822221911cdbdfe3196125292f84119b9
75605697cc684124bae2edf2690827802431910877d413be94f0a872bf728e11d
d914890dffc70d9f99e5f0b71ca99eb7860177178d0daa30c7d7b2b9f8a3018f1
6b2029984e7b00f211857eedf7d3d186100811329cf306a1fe6a892e5330baa96
84981f91adb0e6a82dc77fae193fa9c8129252140d583dd987320a064db71df66

This hints to me the database extraction was not done correctly. If you have DB dump, PM me the dump and I'll check...

Yes, the big problem was extraction, because the original DB was in PDF(used various online tools to convert from PDF to excel(most of them were bad)), so there could be some bad lines. But for the most part the hashes and salt should be correct. I will send you both PDF and EXCEL versions of this part of DB.



4 Results - Page 1 of 1 -
1

We have a total of 160052 messages in 20116 topics.
We have a total of 18822 registered users.
Our newest registered member is Valyast.