12x GPU Monster For SALE by HashKiller Owner

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Found Passwords from Not Found Lists - Found passwords [3]


36 Results - Page 1 of 2 -
1 2
Author Message
Avatar
blandyuk
Admin / Owner
Status: Trusted
Joined: Tue, 05 Jul 2011
Posts: 3222
Team: HashKiller
Reputation: 7731 Reputation
Online
Mon, 21 Nov 2011 @ 10:29:14

Use http://paste2.org/new-paste rather than posting a huge list in the forums.
<em>edited by blandyuk on 22/12/2011</em>


Please read the forum rules | Please read the paid section rules
I accept private hash lists, with forum donations only.
BTC: 1JZGVq58m4RS1QQS8JE5xndzDFy2BvGU6y
GPU Power: 9x GTX 1070 + 6x GTX 1080

Avatar
Mullog

Status: Member
Joined: Tue, 05 Jul 2011
Posts: 101
Team:
Reputation: 21 Reputation
Offline
Tue, 29 Nov 2011 @ 18:43:38

"32 char HEX hashes from last 7" days does not work for me
and the dl for the "normal 32hex" hashlist is always stopping at the haf way
same for 40 hex


Avatar
blandyuk
Admin / Owner
Status: Trusted
Joined: Tue, 05 Jul 2011
Posts: 3222
Team: HashKiller
Reputation: 7731 Reputation
Online
Tue, 29 Nov 2011 @ 22:03:55

Strange :/ I'll have a look when I can.


Please read the forum rules | Please read the paid section rules
I accept private hash lists, with forum donations only.
BTC: 1JZGVq58m4RS1QQS8JE5xndzDFy2BvGU6y
GPU Power: 9x GTX 1070 + 6x GTX 1080

Avatar
Mullog

Status: Member
Joined: Tue, 05 Jul 2011
Posts: 101
Team:
Reputation: 21 Reputation
Offline
Wed, 30 Nov 2011 @ 15:35:47

the 32_hex.zip seems corupt. The error message translated in english:The Compressed (zipped) Folder is invalid or corrupted

edit:
ok it seems to work with winrar
but the last 7 day list is still not accessible
<em>edited by Mullog on 30/11/2011</em>


Avatar
Mullog

Status: Member
Joined: Tue, 05 Jul 2011
Posts: 101
Team:
Reputation: 21 Reputation
Offline
Wed, 30 Nov 2011 @ 19:01:21

tried some new rules with smal wordlist

MD5: http://paste2.org/p/1803406

my fav pw
ba285689ae0727d9232108961a62c03a:1qaz2wsx3edc4rfv5tgb6yhn7ujm8ik9ol0p
<em>edited by Mullog on 30/11/2011</em>


Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Thu, 01 Dec 2011 @ 16:20:52

Total of 65129 cracked from 40_hex (cracked 13325 SHA1) and 32_hex (cracked 51804 MD5).

The passwords contain quite a few non-ASCII characters, so the upload is encoded in UTF-8. There are some ISO-8859 characters from diverse dictionaries which show as stray bytes.

Enjoy!
http://www.sendspace.com/file/24wlxa


Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Thu, 01 Dec 2011 @ 16:22:06

Mullog said:

the 32_hex.zip seems corupt. The error message translated in english:The Compressed (zipped) Folder is invalid or corrupted

edit:
ok it seems to work with winrar
but the last 7 day list is still not accessible
edited by Mullog on 30/11/2011

The files end in *.zip, but are actually gzip compressed text files. Just rename them to 32_hex.gz and 40_hex.gz and try again.


Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Fri, 02 Dec 2011 @ 01:08:58

Here are 15 more of the (new?) type hinted at by the many occurences in the 51804 MD5 hashes.

What I had done is to create md5s of popular password lists and feed them back for testing against 32_hex. I got a lot of hits. Iteration over the result and mangling rules then found the pattern. I am currently running a script to find a few more.

New has type: $hash = md5(md5($pass) + $salt)

+ = string concatenation
$salt is a string of 3 random chars, may be limited to the base64 charset (unverified)

d41d8cd98f00b204e9800998ecf8427e6"(
d41d8cd98f00b204e9800998ecf8427e:3p
d41d8cd98f00b204e9800998ecf8427eLT"
d41d8cd98f00b204e9800998ecf8427el8s
008c5926ca861023c1d2a36653fd88e2L7Q
009b927906b97d1507451f45d795d55eaw*
018a9567ea15470312c40d3e5d6bbcd4nWH
0421008445828ceb46f496700a5fa65eU2&lt;
0571749e2ac330a7455809c6b0e7af90V0#
0571749e2ac330a7455809c6b0e7af90lX~
059bf68f71c80fce55214b411dd2280c.\V
05a671c66aefea124cc08b76ea6d30bb857
05ab9d559eb4e8d4ea7c9f0176644facPcK


Example:

$pass = "snikers", $salt = "{8-"
08d0a97363ac1c145bd34f1d69014020 = md5($pass)
0ba3297a9ee3b4941ccdefdc803028cc = md5("08d0a97363ac1c145bd34f1d69014020" + $salt)

0ba3297a9ee3b4941ccdefdc803028cc is contained in in 32_hex.
<em>edited by zyx4cba on 02/12/2011</em>


Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Fri, 02 Dec 2011 @ 02:45:01

There is another formula used in the 51804-found-md5.utf8.txt list.

md5(sha1($pass))

Examples:

ca98bfa7cabccf78839355a52be1fe27 = md5("0041a058fd6c8b92db9e5fe318d7725eaac8bcd1") = md5(sha1("Dazhinar"))
f8ca594256b348abee6ee65559f91568 = md5("014c2df5b94caec4d62043018147d799cfb0ce6c") = md5(sha1("ador1990@hotmail.com"))
3d1030e2f9fe0c2c77912cb5312cfef8 = md5("015f7cffe12e247583cba6db686698809f712a76") = md5(sha1("muta:tion"))

These three md5 hashes are in 51804-found-md5.utf8.txt.
<em>edited by zyx4cba on 02/12/2011</em>


Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Fri, 02 Dec 2011 @ 03:26:17

Another formula, used in 13325-found.sha1.utf8.txt this time (i.e. comes from 40_hex).

0e30786c62a1b7e5ef92383cf935ccf914794477 = sha1("fe8305865e823e6acace9824bcc3cdae") = sha1(md5("goatwood"))


Avatar
blandyuk
Admin / Owner
Status: Trusted
Joined: Tue, 05 Jul 2011
Posts: 3222
Team: HashKiller
Reputation: 7731 Reputation
Online
Fri, 02 Dec 2011 @ 09:09:48

I know about all the different formulas and also salted hashes, most are mentioned in the Downloads pages. Problem with the vBulletin salted hashes is there are just over 800,000 possible salts and I can only get them into oclHashcat in 2 parts and even then it's slow.


Please read the forum rules | Please read the paid section rules
I accept private hash lists, with forum donations only.
BTC: 1JZGVq58m4RS1QQS8JE5xndzDFy2BvGU6y
GPU Power: 9x GTX 1070 + 6x GTX 1080

Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Sat, 03 Dec 2011 @ 14:44:07

blandyuk said:

I know about all the different formulas and also salted hashes, most are mentioned in the Downloads pages. Problem with the vBulletin salted hashes is there are just over 800,000 possible salts and I can only get them into oclHashcat in 2 parts and even then it's slow.

Two key points:
1) 32_hex and 40_hex have grown so big they are unhandy to deal with
2) Salts work as expected in exploding the keyspace

My point, however, was this. 32_hex and 40_hex are full of hashes of hashes. I don't care what formula created them, they are there. Look at this simple experiment using the data as per december 2nd:

---snip---

$&gt; john 32_hex --wordlist=32_hex--rules --format=raw-md5
[...]
guesses: 23570 time: 0:00:00:37 DONE (Sat Dec 3 15:10:44 2011) c/s: 151931M

$&gt; john 40_hex --wordlist=32_hex --rules --format=raw-sha1
[...]
guesses: 1119 time: 0:00:00:34 DONE (Sat Dec 3 15:13:50 2011) c/s: 23105M

$&gt; john 40_hex --wordlist=40_hex --rules --format=raw-sha1
[...]
guesses: 534 time: 0:00:00:05 DONE (Sat Dec 3 15:15:29 2011) c/s: 22048M

$&gt; john 32_hex --wordlist=40_hex--rules --format=raw-md5
[...]
guesses: 740 time: 0:00:00:05 DONE (Sat Dec 3 15:21:35 2011) c/s: 157823M

$&gt; wc -l john.pot
25941 john.pot

---snip---

The best dictionaries to use on the uncracked data seem to be lists of hashes! 25941 'cracked' hashes in &lt; 2 minutes, using nothing but recursion on the uncracked hash files themselves. Not bad, is it.

I wouldn't be suprised if you could cut the uncracked hash files size by some double digit % figure by just running them against your 8.7B cracked hashes - the hash values, not the passwords. Some minor mangling (append/prepend 1-3 spaces, append/prepend 1-2 tabs, uppercase, lowercase, and capitalize first char) will add significantly more hits. Very cheap shots, with huge return value.
<em>edited by zyx4cba on 03/12/2011</em>


Avatar
SmilingWolf

Status: n/a
Joined: Tue, 23 Aug 2011
Posts: 90
Team:
Reputation: 27 Reputation
Offline
Sun, 04 Dec 2011 @ 08:47:27

MD5 (47649): http://www.mediafire.com/?7hfcy2l24q4ess8

Those are both from the normal 32_hex list and the 32_hex_7_days


Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Sun, 04 Dec 2011 @ 11:05:14

16828 fresh hashes, some of which may overlap with SmilingWolf's. But this was a deep drill anyway. The twist is 20 clearly identified formulas with examples. The archive contains a Perl script to parse the john.pot format. I just didn't feel like re-inventing the wheel. The script just counts types, but should be easily extended.

7387 $dynamic_0$ keys. # md5($p)
102 $dynamic_1001$ keys. # md5(md5(md5(md5($p))))
157 $dynamic_1002$ keys. # md5(md5(md5(md5(md5($p)))))
24 $dynamic_1003$ keys. # md5(md5($p).md5($p))
85 $dynamic_1004$ keys. # md5(md5(md5(md5(md5(md5($p))))))
32 $dynamic_1005$ keys. # md5(md5(md5(md5(md5(md5(md5($p)))))))
82 $dynamic_1006$ keys. # md5(md5(md5(md5(md5(md5(md5(md5($p))))))))
6 $dynamic_1016$ keys. # md5(upper(md5($p)))
12 $dynamic_1017$ keys. # md5(upper(md5(upper(md5($p)))))
11 $dynamic_1018$ keys. # md5(upper(md5(upper(md5(upper(md5($p)))))))
24 $dynamic_1063$ keys. # md5(md5($p).md5($p)
15 $dynamic_1068$ keys. # sha1(sha1($p))
10 $dynamic_1069$ keys. # sha1(sha1(sha1($p)))
17 $dynamic_1165$ keys. # md5(sha1(md5(sha1($p))))
1665 $dynamic_2$ keys. # md5(md5($p))
320 $dynamic_22$ keys. # md5(sha1($p))
1860 $dynamic_23$ keys. # sha1(md5($p))
215 $dynamic_3$ keys. # md5(md5(md5($p)))
901 $NT$ keys.
3903 raw-sha1 keys.
Total: 16828 keys in 20 different formats.

Enjoy!
http://www.mediafire.com/?8lc3q1a3i0z8sbr


Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Mon, 05 Dec 2011 @ 09:48:28

Just applied the john.pot which has grown since December 2nd to 32/40_hex as per December 5th, yielding 89242 cracks. Details see below. I am starting to get used to the recursive process of cracking MD5/SHA slowly. Please allow some questions i have about the process.

1) Merging in 3rd party results to your 32_hex and 40_hex DB
Having found quite a few passwords sumbitted by others and myself earlier again, I do ask myself what the method and timing of merging in 3rd party submissions is. There is no use to keep cracking the ever same data, or to submit the ever same "results".

2) Removing cracked hashes of types not equal to MD5 and SHA1
A number of hashes cracked to "real" passwords (as compared to new hashes) under formulas/algorithms which are not plain SHA1 and MD5, e.g. the 903 NTLM hashes. How are these purged from 32/40_hex and what is the schedule for this?

3) Automated result submission
It would be fairly easy to automate my own cracking process and donate a few CPU hours per day. Downloading 32/40_hex via cron is trivial, but uploading the results cumbersome. Do you offer an API for this, and maybe more operations?

Overview of my cracking status:

54150 $dynamic_0$ keys. # md5($p)
2482 $dynamic_1001$ keys. # md5(md5(md5(md5($p))))
1702 $dynamic_1002$ keys. # md5(md5(md5(md5(md5($p)))))
24 $dynamic_1003$ keys. # md5(md5($p).md5($p))
1102 $dynamic_1004$ keys. # md5(md5(md5(md5(md5(md5($p))))))
877 $dynamic_1005$ keys. # md5(md5(md5(md5(md5(md5(md5($p)))))))
743 $dynamic_1006$ keys. # md5(md5(md5(md5(md5(md5(md5(md5($p))))))))
159 $dynamic_1016$ keys. # md5(upper(md5($p)))
88 $dynamic_1017$ keys. # md5(upper(md5(upper(md5($p)))))
61 $dynamic_1018$ keys. # md5(upper(md5(upper(md5(upper(md5($p)))))))
24 $dynamic_1063$ keys. # md5(md5($p).md5($p)
337 $dynamic_1068$ keys. # sha1(sha1($p))
127 $dynamic_1069$ keys. # sha1(sha1(sha1($p)))
21 $dynamic_1165$ keys. # md5(sha1(md5(sha1($p))))
8055 $dynamic_2$ keys. # md5(md5($p))
874 $dynamic_22$ keys. # md5(sha1($p))
2164 $dynamic_23$ keys. # sha1(md5($p))
3703 $dynamic_3$ keys. # md5(md5(md5($p)))
903 $NT$ keys.
11646 raw-sha1 keys.
Total: 89242 keys in 20 different formats.

http://www.mediafire.com/?fz4eb8v6rvcecyc


Avatar
blandyuk
Admin / Owner
Status: Trusted
Joined: Tue, 05 Jul 2011
Posts: 3222
Team: HashKiller
Reputation: 7731 Reputation
Online
Mon, 05 Dec 2011 @ 16:04:51

Thanks zyx4cba but I cannot import these in their current format due to all the hashes being in one file I could do with separate lists:

MD5
NTLM
LM
SHA1
md5(sha1($pass))
sha1(md5($pass))
MD5x2, MD5x3 etc can go in one file.
SHA1x2, SHA1x3 etc can go in one file.

MD5x2 = md5(md5($pass))


Please read the forum rules | Please read the paid section rules
I accept private hash lists, with forum donations only.
BTC: 1JZGVq58m4RS1QQS8JE5xndzDFy2BvGU6y
GPU Power: 9x GTX 1070 + 6x GTX 1080

Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Mon, 05 Dec 2011 @ 22:48:54

blandyuk said:

Thanks zyx4cba but I cannot import these in their current format due to all the hashes being in one file I could do with separate lists:

MD5
NTLM
LM
SHA1
md5(sha1($pass))
sha1(md5($pass))
MD5x2, MD5x3 etc can go in one file.
SHA1x2, SHA1x3 etc can go in one file.

MD5x2 = md5(md5($pass))

Here you are: http://www.mediafire.com/download.php?3diwe05myohz3fn

Keys:

Code:
 58710 $dynamic_0$    keys.     # md5($p)
  2506 $dynamic_1001$ keys.     # md5(md5(md5(md5($p))))
  1728 $dynamic_1002$ keys.     # md5(md5(md5(md5(md5($p)))))
    24 $dynamic_1003$ keys.     # md5(md5($p).md5($p))
  1128 $dynamic_1004$ keys.     # md5(md5(md5(md5(md5(md5($p))))))
   893 $dynamic_1005$ keys.     # md5(md5(md5(md5(md5(md5(md5($p)))))))
   756 $dynamic_1006$ keys.     # md5(md5(md5(md5(md5(md5(md5(md5($p))))))))
   164 $dynamic_1016$ keys.     # md5(upper(md5($p)))
    88 $dynamic_1017$ keys.     # md5(upper(md5(upper(md5($p)))))
    61 $dynamic_1018$ keys.     # md5(upper(md5(upper(md5(upper(md5($p)))))))
    24 $dynamic_1063$ keys.     # md5(md5($p).md5($p)
   344 $dynamic_1068$ keys.     # sha1(sha1($p))
   128 $dynamic_1069$ keys.     # sha1(sha1(sha1($p)))
    22 $dynamic_1165$ keys.     # md5(sha1(md5(sha1($p))))
  8233 $dynamic_2$    keys.     # md5(md5($p))
   881 $dynamic_22$   keys.     # md5(sha1($p))
  2173 $dynamic_23$   keys.     # sha1(md5($p))
  3731 $dynamic_3$    keys.     # md5(md5(md5($p)))
   918 $NT$           keys.
 19937 raw-sha1       keys.
Total: 102449 keys in 20 different formats.

Files:

102449.pot - raw JtR pot, from which all other files are derived
MD5-58710.found - just the MD5 hashes in the pot
MD5SHA1-881.found - just the md5(sha1($p)) hashes in the pot
MD5xN-8247.found - just the MD5^n hashes in the pot
NTLM-918.found - just the NTLM hashes in the pot
SHA1-19937.found - just the SHA1 hashes in the pot
SHA1MD5-2173.found - just the sha1(md5($p)) hashes in the pot
SHA1xN-344.found - just the SHA1^n hashes in the pot

Unresolved:

These pot entries are not reflected in the single typed files, yet.

164 $dynamic_1016$ keys. # md5(upper(md5($p)))
88 $dynamic_1017$ keys. # md5(upper(md5(upper(md5($p)))))
61 $dynamic_1018$ keys. # md5(upper(md5(upper(md5(upper(md5($p)))))))a
22 $dynamic_1165$ keys. # md5(sha1(md5(sha1($p))))
24 $dynamic_1003$ keys. # md5(md5($p).md5($p))
<em>edited by zyx4cba on 12/12/2011</em>


Avatar
Andrew

Status: n/a
Joined: Wed, 07 Dec 2011
Posts: 5
Team:
Reputation: 5 Reputation
Offline
Wed, 07 Dec 2011 @ 09:36:35

Here you are.
Decrypt from 32_hex_7_days.txt

http://paste2.org/p/1812579
http://paste2.org/p/1812585

Decrypt from 32_hex
http://paste2.org/p/1813132

edited by Andrew on 07/12/2011
<em>edited by Andrew on 07/12/2011</em>


Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Thu, 08 Dec 2011 @ 01:09:39

10413 more cracked. http://www.mediafire.com/download.php?w65orv25s5pyi9b

Some of them were already posted earlier, but likely got mangled in the import process. But: ??, Ödlingur, or ???? are just fine paswords too Please support full UTF-8 encoded input, non-latin script dictionaries are checked and losing these hits is just a waste. If you need another encoding, pleases state which and I see what i can do w/r to recoding to it.

Code:
  6885 $dynamic_0$    keys.     # md5($p)
    27 $dynamic_1001$ keys.     # md5(md5(md5(md5($p))))
    21 $dynamic_1002$ keys.     # md5(md5(md5(md5(md5($p)))))
    24 $dynamic_1003$ keys.     # md5(md5($p).md5($p))
    12 $dynamic_1004$ keys.     # md5(md5(md5(md5(md5(md5($p))))))
     9 $dynamic_1005$ keys.     # md5(md5(md5(md5(md5(md5(md5($p)))))))
    16 $dynamic_1006$ keys.     # md5(md5(md5(md5(md5(md5(md5(md5($p))))))))
     1 $dynamic_1016$ keys.     # md5(upper(md5($p)))
    24 $dynamic_1063$ keys.     # md5(md5($p).md5($p)
     5 $dynamic_1068$ keys.     # sha1(sha1($p))
     1 $dynamic_1069$ keys.     # sha1(sha1(sha1($p)))
     1 $dynamic_1165$ keys.     # md5(sha1(md5(sha1($p))))
   249 $dynamic_2$    keys.     # md5(md5($p))
    15 $dynamic_22$   keys.     # md5(sha1($p))
   133 $dynamic_23$   keys.     # sha1(md5($p))
    22 $dynamic_3$    keys.     # md5(md5(md5($p)))
     3 $NT$           keys.
  2965 raw-sha1       keys.
Total: 10413 keys in 18 different formats.

<em>edited by zyx4cba on 12/12/2011</em>


Avatar
fooble

Status: n/a
Joined: Thu, 08 Dec 2011
Posts: 15
Team:
Reputation: 3 Reputation
Offline
Thu, 08 Dec 2011 @ 22:26:34

32 char HEX hashes from last 7 days
MD5: http://paste2.org/p/1814961

32 char hex hashes
MD4: http://paste2.org/p/1814976
NTLM: http://paste2.org/p/1814986
MD5: http://paste2.org/p/1815024 (Use d3ad0ne.rule on wordlists. Got a lot of hits. But my GPU can't handle more)
<em>edited by fooble on 08/12/2011</em>


Avatar
SmilingWolf

Status: n/a
Joined: Tue, 23 Aug 2011
Posts: 90
Team:
Reputation: 27 Reputation
Offline
Fri, 09 Dec 2011 @ 14:10:28

Just a few MD5s from both the 32_hex lists

MD5 (2190): http://paste2.org/p/1815860


Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Fri, 09 Dec 2011 @ 19:02:57

Found new encryption types

32_hex: Lotus v5 Proprietary

Examples:
e1b284d0e972c839f3616879fb4403fb:codelco
561c0f5dbb5e41f7f9cd08e706d7fb45:cohe
3e05363afa8abc51d637b1df730a28c6:madras
786c2a0c0fcfde89954c592f9b51a445:mymlan
c10ea6ec5707ab0bd5035fbb9e92a2fd:arcay
0c506a6b3175a88ac9ec0d80a2b7612f:azerty
82b5c4ad6e0bbd2b58a061e95b7f9884:petak
4a0aaec0723218caaa0d42e552ed46eb:duser
c06f42a4b882a99d679927fb97ff781b:freedom
63e4bd1fefd8913b15a5ef484a3f6b06:test
c49f819fc496df3459c4487b97ba2521:12345678
772b132ab2bd5ac549d9e0285d2ebebb:1234
c1c1308fc0ebc1748219c47d84680b3d:1100
e588b93b0642e5e4fdfd24a1b195dc4c:111111


40_hex: SHA

Examples:
c2a2375805a56319dee62cd8e45384091166acea:support
f39fa4b9220651280be591d92a77ad464fb2bc2e:admin
399aa5ec9195903a02e27a41b2f6c942716c4c63:dupa
a3e1cdeff5cb56e2fb012fd2027ef3c765f9e21:blackberry
80072568beb3b2102325eb203f6d0ff92f5cef8e:password
f96cea198ad1dd5617ac084a3d92c6107708c0ef:
08b48742a0ff2a37d3fc3935fc51982f5c926b04:go4gold

I'll add them to my reporting script and crack a few
<em>edited by zyx4cba on 09/12/2011</em>


Avatar
Andrew

Status: n/a
Joined: Wed, 07 Dec 2011
Posts: 5
Team:
Reputation: 5 Reputation
Offline
Sat, 10 Dec 2011 @ 17:05:25

MD5:

http://paste2.org/p/1817605


Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Sat, 10 Dec 2011 @ 18:23:51

12943 found in 32/40_hex as per Dec 10th 2011.

Code:
  7746 $dynamic_0$    keys.     # md5($p)
    41 $dynamic_1001$ keys.     # md5(md5(md5(md5($p))))
    60 $dynamic_1002$ keys.     # md5(md5(md5(md5(md5($p)))))
    24 $dynamic_1003$ keys.     # md5(md5($p).md5($p))
    14 $dynamic_1004$ keys.     # md5(md5(md5(md5(md5(md5($p))))))
     9 $dynamic_1005$ keys.     # md5(md5(md5(md5(md5(md5(md5($p)))))))
    17 $dynamic_1006$ keys.     # md5(md5(md5(md5(md5(md5(md5(md5($p))))))))
     6 $dynamic_1016$ keys.     # md5(upper(md5($p)))
     1 $dynamic_1017$ keys.     # md5(upper(md5(upper(md5($p)))))
    24 $dynamic_1063$ keys.     # md5(md5($p).md5($p)
    14 $dynamic_1068$ keys.     # sha1(sha1($p))
     6 $dynamic_1069$ keys.     # sha1(sha1(sha1($p)))
     1 $dynamic_1165$ keys.     # md5(sha1(md5(sha1($p))))
  3697 $dynamic_12$   keys.     # sha1($p)
   898 $dynamic_2$    keys.     # md5(md5($p))
    55 $dynamic_22$   keys.     # md5(sha1($p))
   215 $dynamic_23$   keys.     # sha1(md5($p))
    42 $dynamic_3$    keys.     # md5(md5(md5($p)))
    24 $NT$           keys.
     7 $SHA$          keys.
    26 lotus5         keys.
    16 $MD4$          keys.
Total: 12943 keys in 22 different formats.

http://www.mediafire.com/download.php?6yqsy47lgrfmfpm

Notes:
- An updated version of the type counting script is included, which supports the new types and upcoming JtR 1.7.9-jumbo1
- 3 new hash types are tested for: MD4, SHA and Lotus v5
- Some MD5 keys may be dupes of Andrew's last posting, didn't verify that
- Added OTHERS-nnn.found file. This picks up hashes of types not sorted into one of the mainstream TYPE-nnn.found files.
- Unicode passwords keep re-appearing from older postings ...
<em>edited by zyx4cba on 12/12/2011</em>


Avatar
Andrew

Status: n/a
Joined: Wed, 07 Dec 2011
Posts: 5
Team:
Reputation: 5 Reputation
Offline
Mon, 12 Dec 2011 @ 10:02:54

4K MD5 found:

http://paste2.org/p/1820176


Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Mon, 12 Dec 2011 @ 16:11:01

Code:
 12764 $dynamic_0$    keys.     # md5($p)
    69 $dynamic_1001$ keys.     # md5(md5(md5(md5($p))))
    63 $dynamic_1002$ keys.     # md5(md5(md5(md5(md5($p)))))
    24 $dynamic_1003$ keys.     # md5(md5($p).md5($p))
    15 $dynamic_1004$ keys.     # md5(md5(md5(md5(md5(md5($p))))))
    15 $dynamic_1005$ keys.     # md5(md5(md5(md5(md5(md5(md5($p)))))))
    17 $dynamic_1006$ keys.     # md5(md5(md5(md5(md5(md5(md5(md5($p))))))))
     7 $dynamic_1016$ keys.     # md5(upper(md5($p)))
     1 $dynamic_1017$ keys.     # md5(upper(md5(upper(md5($p)))))
    24 $dynamic_1063$ keys.     # md5(md5($p).md5($p)
    17 $dynamic_1068$ keys.     # sha1(sha1($p))
     6 $dynamic_1069$ keys.     # sha1(sha1(sha1($p)))
     1 $dynamic_1165$ keys.     # md5(sha1(md5(sha1($p))))
  4017 $dynamic_12$   keys.     # sha1($p)
  1023 $dynamic_2$    keys.     # md5(md5($p))
    61 $dynamic_22$   keys.     # md5(sha1($p))
   220 $dynamic_23$   keys.     # sha1(md5($p))
    52 $dynamic_3$    keys.     # md5(md5(md5($p)))
    26 $NT$           keys.
     7 $SHA$          keys.
    26 lotus5         keys.
   459 $MD4$          keys.
Total: 18914 keys in 22 different formats.

http://www.mediafire.com/download.php?xt50obxflwq52ll

- Not checked for dupes with Andrew's last posting
- Against 32/40_hex as of Dec 12th 2011
- MD4 creates odd hits, needs checking
<em>edited by zyx4cba on 12/12/2011</em>


Avatar
!mperiaL

Status: n/a
Joined: Mon, 12 Dec 2011
Posts: 1
Team:
Reputation: 1 Reputation
Offline
Mon, 12 Dec 2011 @ 21:58:32

HEX 32 Cracked Hashes: http://paste2.org/p/1821099


Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Tue, 13 Dec 2011 @ 02:20:54

1323 LM hashes cracked, 784 fully and 539 partly.

http://www.mediafire.com/download.php?8y78bno9ybdh3pr


Avatar
hasheponge

Status: Elite
Joined: Fri, 16 Dec 2011
Posts: 1671
Team:
Reputation: 1117 Reputation
Offline
Fri, 16 Dec 2011 @ 12:22:30

http://paste2.org/p/1826021

1667 MD5 hashes cracked... in progress ;-)


Specs -
Nvidia 660 Ti - 470 GTX - Radeon 6950

Avatar
hasheponge

Status: Elite
Joined: Fri, 16 Dec 2011
Posts: 1671
Team:
Reputation: 1117 Reputation
Offline
Fri, 16 Dec 2011 @ 14:32:37

http://paste2.org/p/1826143

lot 2 : 1906 MD5 Cracked - (12-16-2011) 15h30

in progress ;-)


Specs -
Nvidia 660 Ti - 470 GTX - Radeon 6950


36 Results - Page 1 of 2 -
1 2

We have a total of 202149 messages in 24910 topics.
We have a total of 22217 registered users.
Our newest registered member is taygergix.