NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check first incase it's already been processed.

Home - General Discussion - Can anything be done with Artifact/Junk Passwords From DB Leaks?

3 Results - Page 1 of 1 -
Author Message

Status: n/a
Joined: Mon, 05 Nov 2018
Posts: 94
Reputation: 10 Reputation
Sun, 30 Dec 2018 @ 21:06:22

Was doing some targeted searching of the and antipublic leaks and came across this password: f67ea6

Given that these leaks don't attribute the source of the passwords there's no way to know where it came from but I'm pretty sure it's not a plaintext password and is the result an error when scraping. It seems to be in hexadecimal which makes me think it's much more likely part of a hash then it is a plaintext password. Any thoughts on what it could be and if it can be used to find the actual pw or at least point in right direction?


Status: Senior
Joined: Fri, 06 Jun 2014
Posts: 1523
Reputation: 2509 Reputation
Sun, 30 Dec 2018 @ 21:57:34

if it is part of a hash, then too short. too many passwords will fit this hash


Status: Member
Joined: Tue, 03 Apr 2018
Posts: 411
Reputation: 425 Reputation
Mon, 31 Dec 2018 @ 02:36:13

1. What algo was the original dump in?

2. Have you checked

3. Were the other passwords in the dump also 6 hex characters?

My haschat stuff (rules, scripts):

3 Results - Page 1 of 1 -

We have a total of 197472 messages in 24431 topics.
We have a total of 21699 registered users.
Our newest registered member is Iamhere4you.