NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Unknown Hashes - HASHES FROM ORACLE DB BUT LOOK LIKE BASE64ENCODED


7 Results - Page 1 of 1 -
1
Author Message
Avatar
MrBR

Status: n/a
Joined: Mon, 23 May 2016
Posts: 75
Team:
Reputation: 10 Reputation
Offline
Fri, 15 Feb 2019 @ 20:17:01

Hello, Thanks for your time reading this topic.

said:

lGpu1uHAWTkJ654321e61exOf2
l86WjfF8zGBQcimalsiUcACN1Ts
AmjcyuVmOWR7x0rQS5f0H
aCVLt9bz9dtF6543216l7OlLKi
EqngBy1pT2V0181167duUW9jdL
pJty5yLE2XoNocfarhsai05hBTj6
cXUM07wWqxsG08913011J3rtEQJj
awUhbYzKKIOxhjpkldgupx9nmFJM
kM7WDilJhnDQ321#vbrfug1vWVs
WHExTQhHbidroCfarhsAuLcepAu5
oa81liI0BIES8i02#fesuoY@nemaYWeDEQ4Wv
VhF4VIlvwuzi654321aiS99quy
bWTL95vVovrE987654321I2qrCOIi
hD3pi7GSSQWE8991@rotcerwEfutMRU
krmAUVlny2Dd198290021v0gCLzc7
0CULs8ay8csE\\\3215k6NlKJh
HtrjFB4tW5Yd525856308fgyX1bmgO
SjsgSLMKRyGQxhtdiaFEXLOE0
rda4olLcFLHV0302011hGIT71y
hD3pi7GSSQWE321#vbrwEfutMRU
FrohCz2qU2Wa5691$D$S$AevVX9keM
vRzEaESK85uU654321ofaoH1pb
63sSmtoCFXnp654321grlUdzXk
ykhavsTjLTO46543218oNO2d8F
CXGKgL1SeaB3654321ulhuO8vh
6RNG4YqQjqmz000001DVlmxICc
Yj49C9lezwXn1QGCQbsSC
rUd5KpsRpuKX@@AA21aamBn8C54z
3oL03OrBCAGo654321gp1fewBE
rda4olLcFLHV4791admo1hGIT71y
wif9tqRhKSM36180026mLN1b6D
bwVibYAKLJQx095410021px9nnFJN
6QMF3YpOjply7654321CUklwICc
2XoNipkxBTjlxwHBbtQeA
sfc6qmNeGNJXx3jHJV82z
lvwuA3ajT09qjras42yuyoSa3In
8tRe8UwGHFLt214amllu6kjBGJ
m07YkgH9AHCRiggh dfspVdBDO2Ut
QByrMJbA6c8k6691117oF79juoX
0uTg0WyIJKRz0002482rzapoHLO
BnkdyvWmQXS8xarRT6gaI
DqngBxYpS1U093leebanduTV8icK
9TQI63sSmtoCxFXnpALFf
kN7XDilJinDQmosmosfvg1wWVs
Nizr0MOeLR9kxI1Jt2rpX
cXUM07wWqwsF1102@remaJ3rtDQJj
Ib6DFjGMXKmx001267xvB5ckUa
fGAacOdjthS5x5U2rzIjy
RCzsNKcB6c9lbergazpG89jvpY
tfc6qnNeGNJXx3jIJV93A
cyWjc1BLMKRyxqzapoGKO
OiAr0MQfMS0lxJ2Ku2rqX
wRAFbFTL96vVxpgbpI2qc
WoiRTwU2aXzJxKIOgox9n
Scgj0CVLt9byx8dtp6kOO
oxMkHjL9B9lexzgGnzGCQ
SDAtOLdC8e0n9002@5311qH9alwq1
CL7BATHKA6DexcQC2OEV9
w1i0QuxWuzQ4xrHscH09E
3MJCYVmLfmiv$$$321leeamsiHzRhitFz0
ErohCy2qT2WaxlC46grlU
tQeIBp3cdbgYxQYyNM8be
bEWNuacA0euGx7m8QnNLk
HurkFB5tW51d030201hyY1bnhO
yVjFymY0a9eV697989MWwLK50c
S2kQO0W1QkSs989188q69wkaqC
e1WOb9yYszuIxL5tvGSLl
9uSf0VxHIGMvxmv7lkCHK
kN7XDilJinDQxfvg1vWVs
j63UgdD6xEzN654321R0yALXRq
0CULs8ay8csE90026543215k6NkKJh
h41SebB3vCxLx2iHJV82z
HtqjEB4sV4YcxgxXYamgO
DpmfAxYoSYU90404542ctTU7icK
z3VuwaxDMAdnxomsT3bK2
VGDwSOgFahcp654321tKbdozt4
oa81liI0CIESxWeDFQ4Wv
pnsb4bKh1jnq654321hKjUAviG
QtrjFB4tW5Yd102910gyX1bmgO
hM1SfUl4fmhv654321O9gitVOo
dyWkd2BMMLRzmossawrzapoHLO
l85WifF7zGBO$$a011080021TbACN1Ts
i52TfcC4wCyLd21nassahQ9xyJWQp
7zSIq68v50pByaddoog3h3LiIGf
i52TfcC4wDyLzreebaQ9xzKWQp
aVSK85uUouqDevihcraymH1pqBNHh
vSgCwkV786bT211021KTtIH370
E3pLFt6ggek4xU4CSRbfi
JwtmHD7vY73f*3791*amaenmxjA23doiR
YJGzVSjIdkftxwNegrCw7
fH2RydgEciyK404004apbUqRQn
7RNG41qQkqmz198290021DVlnxJDd
BK2xVw1lOlyrxMtUAMUQ5
LyvoJF9x294hxlC35fqkT
e1WOb9yYryuHxL5tuFSLl
HurkFB5tW51d987654321hyX1bmgO
rNcyrfR3428NigghhghighhgFOpEDW36
UFCvRNfE9fbo654321sJabmys3
reb5plLdFMHW1102@aihay2iGIU71y
0VSK84tUnupDxH1oqBMGg
pb92mjJaCJFTxXfEFR5Xw
MyvoJG9x305ixlC46grlU
XkH6XKnxywCkxclVbasxA
0CULs9ay8csEx5k6NlLJi
E2INjN3UgdD5xxojxR0yk
gzDGw2jaRvyWxuARMsHdd
0vTgaXyJJHNw654321ow8mlEIL
rIST6wq14ELaxj8HCCBGp
luNkjBqtjMmWxUykIxmCO
B7ofWAC3zEV9654321xMxiNfdK
k41SeaB3uBwK21O8vxIUNn
wjg0uqSiKSM3999iggh lsf7nLN1b6D
9URJ73tTmtpCxGYopAMGg
xUiEylX908dVxMVvKJ59b
5xQGo46t38nzx1f1JgGEd
M0RWrWa4olLcxFwrF1hGs
D71yAeBISFhsxsqwY8fO6

These hashes from Windows SERVER have ORACLE, There is column called password_versions and all of them are "10G 11G" i don't know what is that mean exactly but i hope there is someone knows how these hashes can crack and tell me if you know please.

Thanks for your time.


Avatar
nick8606

Status: Trusted
Joined: Sat, 18 May 2013
Posts: 162
Team:
Reputation: 185 Reputation
Online
Sat, 16 Feb 2019 @ 01:35:35

You can try such PHP code:
$pass = strrev(substr($hash, 12, strlen($hash)-20));

Possibly you'll get clear passwords.

10 items from the beginning of your list:
lGpu1uHAWTkJ654321e61exOf2:123456
l86WjfF8zGBQcimalsiUcACN1Ts:islamic
AmjcyuVmOWR7x0rQS5f0H:x
aCVLt9bz9dtF6543216l7OlLKi:123456
EqngBy1pT2V0181167duUW9jdL:761181
pJty5yLE2XoNocfarhsai05hBTj6:ashrafco
cXUM07wWqxsG08913011J3rtEQJj:11031980
awUhbYzKKIOxhjpkldgupx9nmFJM:ugdlkpjh
kM7WDilJhnDQ321#vbrfug1vWVs:rbv#123
WHExTQhHbidroCfarhsAuLcepAu5:AshrafCo


BTC 1MMfrVTvP9dHw9eDbQ34XtDZ9Xcq34HEPP

Avatar
MrBR

Status: n/a
Joined: Mon, 23 May 2016
Posts: 75
Team:
Reputation: 10 Reputation
Offline
Sat, 16 Feb 2019 @ 01:51:16

nick8606 said:

You can try such PHP code:
$pass = strrev(substr($hash, 12, strlen($hash)-20));

Possibly you'll get clear passwords.

10 items from the beginning of your list:
lGpu1uHAWTkJ654321e61exOf2:123456
l86WjfF8zGBQcimalsiUcACN1Ts:islamic
AmjcyuVmOWR7x0rQS5f0H:x
aCVLt9bz9dtF6543216l7OlLKi:123456
EqngBy1pT2V0181167duUW9jdL:761181
pJty5yLE2XoNocfarhsai05hBTj6:ashrafco
cXUM07wWqxsG08913011J3rtEQJj:11031980
awUhbYzKKIOxhjpkldgupx9nmFJM:ugdlkpjh
kM7WDilJhnDQ321#vbrfug1vWVs:rbv#123
WHExTQhHbidroCfarhsAuLcepAu5:AshrafCo


WOW BROTHER THANK YOU TOOOO MUCH. BUT WHAT IS LIKE THIS HASHING CALL? DID IT HAVE A SPECIFIC NAME OR YOU JUST RESOLVE IT?


Avatar
nick8606

Status: Trusted
Joined: Sat, 18 May 2013
Posts: 162
Team:
Reputation: 185 Reputation
Online
Sat, 16 Feb 2019 @ 02:38:08

It's custom encoding, no specific name.
Just I've look attentively.


BTC 1MMfrVTvP9dHw9eDbQ34XtDZ9Xcq34HEPP

Avatar
MrBR

Status: n/a
Joined: Mon, 23 May 2016
Posts: 75
Team:
Reputation: 10 Reputation
Offline
Sat, 16 Feb 2019 @ 02:56:41

nick8606 said:

It's custom encoding, no specific name.
Just I've look attentively.

Thanks a lot. that gave me a good lesson i wont forget it in my whole life <3 #nohomo. Thank you too much.


Avatar
gpuhash_me

Status: Trusted
Joined: Sun, 08 Nov 2015
Posts: 786
Team: gpuhash team
Reputation: 1574 Reputation
Offline
Sat, 16 Feb 2019 @ 03:16:25

nick8606 said:

You can try such PHP code:
$pass = strrev(substr($hash, 12, strlen($hash)-20));

Possibly you'll get clear passwords.

Nice find! Classic security through obscurity example.
The same with awk and rev:

$ echo lGpu1uHAWTkJ654321e61exOf2 | awk '{print substr($0,13,length($0)-20)}' | rev
123456


Head of cheap publicity department
Support, discounts, free offers for HK members
BTC: 1GPUHASHrfT1hbDJ8KBETkTieyNzUMwMXZ

Avatar
MrBR

Status: n/a
Joined: Mon, 23 May 2016
Posts: 75
Team:
Reputation: 10 Reputation
Offline
Sat, 16 Feb 2019 @ 04:15:28

gpuhash_me said:

nick8606 said:

You can try such PHP code:
$pass = strrev(substr($hash, 12, strlen($hash)-20));

Possibly you'll get clear passwords.

Nice find! Classic security through obscurity example.
The same with awk and rev:

$ echo lGpu1uHAWTkJ654321e61exOf2 | awk '{print substr($0,13,length($0)-20)}' | rev
123456

Thank you to code it with AWK. it make things more easy, thanks again.



7 Results - Page 1 of 1 -
1

We have a total of 184792 messages in 22875 topics.
We have a total of 20652 registered users.
Our newest registered member is winners.