NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - General Discussion - hashes.org question


4 Results - Page 1 of 1 -
1
Author Message
Avatar
aBritishboy46

Status: n/a
Joined: Wed, 19 Jun 2019
Posts: 22
Team:
Reputation: 10 Reputation
Offline
Sat, 22 Jun 2019 @ 10:05:31

In some hashes.org dumps, e.g. powerbot, a lot of the cracked passwords seems to be two md5 hashes, what does this mean?

Example:
000371e579bb5f83ae00b743688b3171::99bae3273a72ad317587de220d806a2bbb821e5e9e329ae0dd551c77f3733754



Rules for cracking my hashes:
- payment btc
- upload founds in the thread and respect other users founds (duplicates will be reported)
- must indicates when you have finished attempt so i can pay.

Avatar
s3in!c
Moderator
Status: Elite
Joined: Wed, 10 Apr 2013
Posts: 895
Team:
Reputation: 1285 Reputation
Online
Sat, 22 Jun 2019 @ 11:31:38

Most likely this is coming from the IPB algorithm which is md5(md5($salt).md5($plain)).

Founds like the above one do exist, because people crack the outer md5 hash and provide the two hashes of the salt and the plain as the plaintext. If you lookup the two separate hashes, you will find the password (goodboy11) and the other hash is not found yet. Most likely it will be 5 or 8 random characters long.

EDIT: cracking the first part reveals the salt (as expected)

Code:
99bae3273a72ad317587de220d806a2b:YR}r4


+Rep if I helped

Hashes.org - Powerful Community Password Recovery
Hashtopolis - Hashcat distributed cracking tool

BTC: 1VTuiKrNoytU1PvYrF3J7VapQ9oPg93Jn

Avatar
dipeperon

Status: Member
Joined: Tue, 03 Apr 2018
Posts: 431
Team:
Reputation: 431 Reputation
Online
Sat, 22 Jun 2019 @ 11:35:19

It seems like they changed hashing algo's quite a few times as I can spot IPB, old VB and new VB and those "unknown" ones you found.


My haschat stuff (rules, scripts): https://github.com/theherp/Hashcat-stuff

Avatar
str0nGh0ld

Status: Cracker
Joined: Thu, 07 Sep 2017
Posts: 1849
Team:
Reputation: 1368 Reputation
Online
Sat, 22 Jun 2019 @ 11:39:07

genuine resolved hash: 000371e579bb5f83ae00b743688b3171:YR}r4:goodboy11
algorithm IPB: md5(md5($salt).md5($pass)

md5($salt):99bae3273a72ad317587de220d806a2b:YR}r4
md5($pass):bb821e5e9e329ae0dd551c77f3733754:goodboy11

composed:
000371e579bb5f83ae00b743688b3171:99bae3273a72ad317587de220d806a2bbb821e5e9e329ae0dd551c77f3733754

qed


"If you’re good at something, never do it for free."-The Joker
btc: 3D9DP6n4a9T6CkNo9uLJM5yQVoaNwi2hwP


4 Results - Page 1 of 1 -
1

We have a total of 216036 messages in 26409 topics.
We have a total of 23291 registered users.
Our newest registered member is arda0202.