NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - General Discussion - Can anything be done with Artifact/Junk Passwords From DB Leaks?


3 Results - Page 1 of 1 -
1
Author Message
Avatar
stackerofwheat

Status: n/a
Joined: Mon, 05 Nov 2018
Posts: 96
Team:
Reputation: 10 Reputation
Offline
Sun, 30 Dec 2018 @ 21:06:22

Was doing some targeted searching of the exploit.in and antipublic leaks and came across this password: f67ea6

Given that these leaks don't attribute the source of the passwords there's no way to know where it came from but I'm pretty sure it's not a plaintext password and is the result an error when scraping. It seems to be in hexadecimal which makes me think it's much more likely part of a hash then it is a plaintext password. Any thoughts on what it could be and if it can be used to find the actual pw or at least point in right direction?


Avatar
dda

Status: Senior
Joined: Fri, 06 Jun 2014
Posts: 1523
Team:
Reputation: 2509 Reputation
Offline
Sun, 30 Dec 2018 @ 21:57:34

if it is part of a hash, then too short. too many passwords will fit this hash


Avatar
dipeperon

Status: Member
Joined: Tue, 03 Apr 2018
Posts: 423
Team:
Reputation: 425 Reputation
Online
Mon, 31 Dec 2018 @ 02:36:13

1. What algo was the original dump in?

2. Have you checked hashes.org?

3. Were the other passwords in the dump also 6 hex characters?


My haschat stuff (rules, scripts): https://github.com/theherp/Hashcat-stuff


3 Results - Page 1 of 1 -
1

We have a total of 201286 messages in 24810 topics.
We have a total of 22099 registered users.
Our newest registered member is heuzzlor.