12x GPU Monster For SALE by HashKiller Owner

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Other Hashes - How feasible is it to crack 50k of bcrypt hashes?


6 Results - Page 1 of 1 -
1
Author Message
Avatar
Sam_Sepiol

Status: n/a
Joined: Sat, 27 Apr 2019
Posts: 7
Team:
Reputation: 0 Reputation
Offline
Sat, 27 Apr 2019 @ 19:23:16

I think all bcrypt hashes have been done with 12 iterations, salt is provided.
I wonder how much time/cost it would take? Some of them would be trivially broken by wordlist, but some would not.

I can also focus on a subset, but I was wondering out of curiosity.

Thanks.


Avatar
Mexx666666
Moderator
Status: Elite
Joined: Fri, 21 Jul 2017
Posts: 1256
Team:
Reputation: 3176 Reputation
Online
Sat, 27 Apr 2019 @ 20:10:58

Sure it´s possible to crack a huge amount of those hashes. But no way 100%.
Also it would be good to know if those hashes are hard leftovers or "untouched" ones.

If you can provide additional usernames/emails or even full dump the chance to crack more bcrypts is way higher ofc!

About price/time: Hard to tell, but i would assume to pay atleast 35$/1k.


PLZ +rep if I helped out!

BTC: 1FxAJJhcqf2DXt[remove]PkdTQi56uc3EGxYQjG4T
PP: mexx66[remove]@gmx.net
Discord: Mexx666666#2361 for PRIVATE & confidential quality hash cracking @ reasonable compensation (email hashes, ALL hashtypes in general)

Avatar
Sam_Sepiol

Status: n/a
Joined: Sat, 27 Apr 2019
Posts: 7
Team:
Reputation: 0 Reputation
Offline
Sat, 27 Apr 2019 @ 20:16:42

What do you mean by "hard leftovers"? Due to the nature of bcrypt, I'm pretty sure those are very new bcrypt hashes (because of the salt mainly), except if there is pure luck involved and a combo passphrase/salt is the very same.


Avatar
Mexx666666
Moderator
Status: Elite
Joined: Fri, 21 Jul 2017
Posts: 1256
Team:
Reputation: 3176 Reputation
Online
Sat, 27 Apr 2019 @ 20:22:34

By "hard leftovers" i mean if someone else has already cracked hashes from that dump before.
In this case i expect the "easy passwords" aren´t existing anymore, which makes those 50k bcrypts even harder to crack.


PLZ +rep if I helped out!

BTC: 1FxAJJhcqf2DXt[remove]PkdTQi56uc3EGxYQjG4T
PP: mexx66[remove]@gmx.net
Discord: Mexx666666#2361 for PRIVATE & confidential quality hash cracking @ reasonable compensation (email hashes, ALL hashtypes in general)

Avatar
Sam_Sepiol

Status: n/a
Joined: Sat, 27 Apr 2019
Posts: 7
Team:
Reputation: 0 Reputation
Offline
Sat, 27 Apr 2019 @ 20:47:31

Alright, and is there any upper limit of the time required for breaking like 2k of those 50k bcrypts? I'm pretty sure those are fresh hashes, for a good reason.


Avatar
Mexx666666
Moderator
Status: Elite
Joined: Fri, 21 Jul 2017
Posts: 1256
Team:
Reputation: 3176 Reputation
Online
Sat, 27 Apr 2019 @ 21:06:48

If easy passwords are used it could take an hour, if not maybe a day....


PLZ +rep if I helped out!

BTC: 1FxAJJhcqf2DXt[remove]PkdTQi56uc3EGxYQjG4T
PP: mexx66[remove]@gmx.net
Discord: Mexx666666#2361 for PRIVATE & confidential quality hash cracking @ reasonable compensation (email hashes, ALL hashtypes in general)


6 Results - Page 1 of 1 -
1

We have a total of 205271 messages in 25313 topics.
We have a total of 22501 registered users.
Our newest registered member is malrweily.