NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - General Discussion - Can anything be done with Artifact/Junk Passwords From DB Leaks?

WARNING!
Due to the number of SCAMS going on in the PAID forum, PLEASE ask an ADMIN or MODERATOR to verify ALL found passwords to ensure you are not being SCAMMED.
DO NOT PAY until an ADMIN or MOD has verified them for you!


3 Results - Page 1 of 1 -
1
Author Message
Avatar
stackerofwheat

Status: n/a
Joined: Mon, 05 Nov 2018
Posts: 22
Team:
Reputation: 10 Reputation
Offline
Sun, 30 Dec 2018 @ 21:06:22

Was doing some targeted searching of the exploit.in and antipublic leaks and came across this password: f67ea6

Given that these leaks don't attribute the source of the passwords there's no way to know where it came from but I'm pretty sure it's not a plaintext password and is the result an error when scraping. It seems to be in hexadecimal which makes me think it's much more likely part of a hash then it is a plaintext password. Any thoughts on what it could be and if it can be used to find the actual pw or at least point in right direction?


Avatar
dda

Status: n/a
Joined: Fri, 06 Jun 2014
Posts: 1500
Team:
Reputation: 2437 Reputation
Offline
Sun, 30 Dec 2018 @ 21:57:34

if it is part of a hash, then too short. too many passwords will fit this hash


HashFinder.InsidePro.team

Avatar
dipeperon

Status: n/a
Joined: Tue, 03 Apr 2018
Posts: 229
Team:
Reputation: 308 Reputation
Online
Mon, 31 Dec 2018 @ 02:36:13

1. What algo was the original dump in?

2. Have you checked hashes.org?

3. Were the other passwords in the dump also 6 hex characters?


My haschat stuff (rules, scripts): https://github.com/theherp/Hashcat-stuff


3 Results - Page 1 of 1 -
1

We have a total of 167488 messages in 20968 topics.
We have a total of 18816 registered users.
Our newest registered member is O.o.