NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - General Discussion - MDXfind


24 Results - Page 1 of 1 -
1
Author Message
Avatar
Waffle

Status: Elite
Joined: Wed, 02 Jan 2013
Posts: 284
Team: CynoSure Prime
Reputation: 357 Reputation
Offline
Fri, 30 May 2014 @ 04:39:57

I'm looking for some folks to help test out MDXfind. Please drop me a note here, or (better) at https://hashes.org/forum/showthread.php?tid=28

Thanks!


Avatar
alotdv

Status: Trusted
Joined: Thu, 10 May 2012
Posts: 1330
Team:
Reputation: 1445 Reputation
Offline
Fri, 30 May 2014 @ 04:51:56

Im using linux so tell me what can i do


Team Hashcat

BTC: 16s8xjDmAxvt2JtGKZbdrFdbZko8hjtw9D
bitcoincash: qrzu70gg2he89s6l2gd2v4ypjfw3gc24lgjuaqqxq3

XMPP: alotdv@xmpp.jp

Avatar
Waffle

Status: Elite
Joined: Wed, 02 Jan 2013
Posts: 284
Team: CynoSure Prime
Reputation: 357 Reputation
Offline
Fri, 30 May 2014 @ 05:01:23

I've sent you a PM. In the meantime, have a look at http://forum.insidepro.com/viewtopic.php?t=29719, to understand some of the capabilities of it. In particular, check out the $TESTVEC[] uses.


Avatar
alotdv

Status: Trusted
Joined: Thu, 10 May 2012
Posts: 1330
Team:
Reputation: 1445 Reputation
Offline
Fri, 30 May 2014 @ 05:45:26

got it, let's try.


Team Hashcat

BTC: 16s8xjDmAxvt2JtGKZbdrFdbZko8hjtw9D
bitcoincash: qrzu70gg2he89s6l2gd2v4ypjfw3gc24lgjuaqqxq3

XMPP: alotdv@xmpp.jp

Avatar
alotdv

Status: Trusted
Joined: Thu, 10 May 2012
Posts: 1330
Team:
Reputation: 1445 Reputation
Offline
Fri, 30 May 2014 @ 05:50:38

Its say need Judy library:

./mdxfind: error while loading shared libraries: libJudy.so.1: cannot open shared object file: No such file or directory


Team Hashcat

BTC: 16s8xjDmAxvt2JtGKZbdrFdbZko8hjtw9D
bitcoincash: qrzu70gg2he89s6l2gd2v4ypjfw3gc24lgjuaqqxq3

XMPP: alotdv@xmpp.jp

Avatar
Waffle

Status: Elite
Joined: Wed, 02 Jan 2013
Posts: 284
Team: CynoSure Prime
Reputation: 357 Reputation
Offline
Fri, 30 May 2014 @ 06:05:37

Yes, you will need to install Judy and probably rhash. apt or yum will get you there.


Avatar
alotdv

Status: Trusted
Joined: Thu, 10 May 2012
Posts: 1330
Team:
Reputation: 1445 Reputation
Offline
Fri, 30 May 2014 @ 08:04:03

ha ha Waffle, affter fix my system the mdxfind working like a charm... That is real thing i expect. lol


Team Hashcat

BTC: 16s8xjDmAxvt2JtGKZbdrFdbZko8hjtw9D
bitcoincash: qrzu70gg2he89s6l2gd2v4ypjfw3gc24lgjuaqqxq3

XMPP: alotdv@xmpp.jp

Avatar
alotdv

Status: Trusted
Joined: Thu, 10 May 2012
Posts: 1330
Team:
Reputation: 1445 Reputation
Offline
Fri, 30 May 2014 @ 08:30:52

I got error ???

alotdv@linux:~$ ./mdxfind -h ^md5 -t 4 -f /media/BackUp/Hash/hash-org/28-5-2014/32_left_split_0.txt /media/BackUp/MD5_dic/DIC.txt >result.out

Working on hash types: MD5 MD5UC MD5SALT MD5RAW MD5MD5PASS MD5SHA1 MD5SHA256 MD5SHA512 MD5HEXSALT MD5SHA1MD5 MD5SHA1MD5SHA1 MD5SHA1MD5SHA1SHA1 MD5HAV160_3 MD5SHA1HAV160_4 MD5SHA1MD5SHA1MD5 MD5RMD160 MD5SHA1SHA256 MD5WRL MD5SHA1SHA1RAW MD5PASSMD5 MD5-DBL-PASS MD5SQL5 MD5MD5UCMD5 MD5BASE64 MD5BASE64MD5 MD5SHA1BASE64 MD5SHA1MD5BASE64 MD5BASE64MD5RAW MD5BASE64SHA1RAW MD5BASE64SHA1RAWMD5 MD5BASE64MD5RAWSHA1 MD5BASE64MD5RAWMD5 MD5BASE64MD5RAWMD5MD5 MD5BASE64SHA1RAWBASE64SHA1RAW MD5SHA1UC MD5SHA1UCMD5 MD5SHA1UCMD5UC MD5SHA1u32 MD5BASE64revMD5 MD5revMD5 MD5revMD5MD5 MD5BASE64MD5MD5 MD5SQL5-40 MD5revSHA1 MD5USERIDMD5 MD5USERIDMD5MD5 MD5MD5UC MD5USERnulPASS MD5RADMIN2 MD5RADMIN2SHA1 MD5RADMIN2MD5 MD51SALTMD5 MD5-MULTISALT MD52SALTMD5 MD51SALTMD5UC MD51SALTMD5MD5 MD5MD5USER MD5SHA1SHA1MD5 MD5SHA1SHA1 MD5SQL5MD5 MD5SQL5-chop40 MD5-2xMD5 MD5-2xMD5-MD5 MD5-2xMD5-SHA1 MD5-2xMD5-MD5MD5 MD5-2xMD5-MD5MD5MD5 MD5-3xMD5 MD5-3xMD5-MD5 MD5-3xMD5-SHA1 MD5-3xMD5-MD5MD5 MD5-3xMD5-MD5MD5MD5 MD5-1xMD5SHA1 MD5-1xSHA1MD5 MD5-1xMD5SHA1-MD5 MD5-1xSHA1MD5-MD5 MD5-1xMD5SHA1-MD5MD5 MD5-1xSHA1MD5-MD5MD5 MD5-1xSHA1MD5pSHA1p MD5SHA1-1xSHA1MD5pSHA1p MD5revp MD5TIGER2 MD5SHA1MD5MD5 MD5SHA1MD5RADMIN2 MD5SHA1MD5MD5MD5SHA1 MD5SHA1RAW MD5SHA1MD5MD5MD5 MD5SQL5-32 MD51SALTMD5MD5MD5 MD51SALTMD5MD5MD5MD5 MD51SALTMD5MD5MD5MD5MD5 MD5BASE64ROT13 MD5MD5SALT MD52SALTMD5MD5 MD52SALTMD5MD5MD5 MD5UCSALT MD5TIGER MD5SHA1MD5PASS MD5CAP MD5CAPMD5USER MD5CAPMD5MD5USER MD5MD5MD5USER MD5MD5SALT:SALT MD5CAPSHA1 MD5SHA1MD5x MD5SHA1BASE64MD5RAW MD5SHA1MD5MD5SHA1 MD5SHA1MD5UC MD5MD5HUM MD5SHA1HUM MD5-MD5SALTMD5PASS MD5NTLM MD5MD4 MD5NTLMUC MD5USERPASS MD5PASSSALT MD5SHA1RADMIN2MD5 MD5UCBASE64MD5RAW MD5UCBASE64SHA1RAW MD5SHA1MD5MD5UC MD5SHA1MD5HUM MD5LM MD5LMUC MD5RAWUC MD5SHA1UCu32 MD5SALTPASS MD5MD5UCSHA1MD5MD5 MD5SHA256MD5 MD5-2xMD5UC MD5-4xMD5 MD5-SHA1numSHA1 MD5-2xSHA1 MD5padMD5 MD5DSALT MD5SALTPASSSALT Generated 903952 saltsGenerated 19998 UseridsTook 4 seconds to read hashesSearching through 2911538 unique hashes from /media/BackUp/Hash/hash-org/28-5-2014/32_left_split_0.txtThere were 1 duplicate hashes on inputMaximum hash chain depth is 350Minimum hash length is 32 characters
Illegal instruction (core dumped)DIC.txt w=0 line 3129801(50) Found=0
alotdv@linux:~$


Team Hashcat

BTC: 16s8xjDmAxvt2JtGKZbdrFdbZko8hjtw9D
bitcoincash: qrzu70gg2he89s6l2gd2v4ypjfw3gc24lgjuaqqxq3

XMPP: alotdv@xmpp.jp

Avatar
Waffle

Status: Elite
Joined: Wed, 02 Jan 2013
Posts: 284
Team: CynoSure Prime
Reputation: 357 Reputation
Offline
Fri, 30 May 2014 @ 14:44:49

First, you probably meant -h ^md5$, not ^md5 (the latter selects all hashes that *start* with md5, which is why it tried the large number of hash variants.

Second, remember that mdxfind doesn't really care how many hashes you have in your input (well, at least if you have enough memory). Rather than working on just one of your lists, do them all.

cat /media/BackUp/Hash/hash-org/28-5-2014/32_left_split_*.txt | mdxfind -h ^sha1$,^md5$,^md5sha1$ -i 5
/media/BackUp/MD5_dic/* >out


Then you can process the results against all of the lists with mdsplit.pl

perl mdsplit.pl /media/BackUp/Hash/hash-org/28-5-2014/32_left_split*.txt <out


Third, the illegal instruction is... interesting. What kind of cpu do you have? I have not checked all the processor variants, which may be the issue here.


Avatar
alotdv

Status: Trusted
Joined: Thu, 10 May 2012
Posts: 1330
Team:
Reputation: 1445 Reputation
Offline
Sat, 31 May 2014 @ 05:38:39

I know -h ^md5$ but for test i try ^md5 so mdxfind can thru many type on one tash. Ex: i use ^hmac to try *hmac hash type. Use this method mdxfind get out many interesting results...lol
Mdxfind really beautyful if you put it to GPU.
My cpu is xeon x3210 with 4 core.


Team Hashcat

BTC: 16s8xjDmAxvt2JtGKZbdrFdbZko8hjtw9D
bitcoincash: qrzu70gg2he89s6l2gd2v4ypjfw3gc24lgjuaqqxq3

XMPP: alotdv@xmpp.jp

Avatar
Waffle

Status: Elite
Joined: Wed, 02 Jan 2013
Posts: 284
Team: CynoSure Prime
Reputation: 357 Reputation
Offline
Sat, 31 May 2014 @ 06:13:32

The danger here is that the salted variants, with the default generated salts, are an impressive time-sink (even though they are mostly optimized to do the hashes 4x). The fact that ^md5 also includes double-salts means that the time is exponential (1M*1M possible salts, for each plaintext, with the default values). Add to that the userid hashes, and ... well... you have a *lot* of time :-)

A better way would be:

mdxfind -i 5 -h ^md5 -h '!salt,!user,!md5x' /word/list/*

This would exclude the salted, user-id, and md5x (internally iterated hashes) from the tests.

As far as time goes (and I really, really would like you to try this and post the results, from the same machine you have ocl-hashcat or your favourite gpu-based engine on):

First, a 'fair' test:

pick a "large" list, like all of the 32*.txt values. Then run mdxfind against all of your password lists:

cat 32*.txt | time mdxfind /word/lists/all/* >out

Then try with ocl-hashcat

time ocl-hashcat -a 0 -m 0 -o out 32-hex-all.txt /word/lists/all/*

Then, do another test. Try running up to -i 3

cat 32*txt | time mdxfind -i 3 /word/lists/all/* >out

Now, ocl-hashcat can't do all of these at once, so you have to do three passes

time ocl-hashcat -a 0 -m 2600 -o out2600 32-hex-all.txt /word/lists/all/*

(I don't know what the code is for triple-md5 with ocl-hashcat).


Then you can do _really_ unfair tests (if you have 32 cores available - use whatever number is appropriate).

cat 32*.txt /other/hash/list/*.txt /even/more/hash/lists/*.txt /and/some/sha1/hashes/*.txt | time mdxfind -t 32 -i 5 -h ^md5$,^sha1$,^md5sha1$ /word/list/all/* >out

and see how long that takes.

You will see why gpu performance is...well... not so important in the most common usages. I spent a great deal of time modeling this.

It's absolutely true that for rule-based work, gpu can add significant value - but not all rules are supported in ocl-hashcat. At some point, I will add gpu support, but you might re-think what is "fast" after you start using the full power of mdxfind....


Avatar
alotdv

Status: Trusted
Joined: Thu, 10 May 2012
Posts: 1330
Team:
Reputation: 1445 Reputation
Offline
Tue, 03 Jun 2014 @ 07:53:06

Today 03-06-2014 i download 4 hash file from hashes.org:
32_left_split_12.txt
32_left_split_13.txt
32_left_split_14.txt
32_left_split_15.txt
and put all into /media/BackUp/Hash/hash-org/03-06-2014/ folder. Only 4 TXT above file in the folder.

I using mini common DIC: 500-worst-passwords.dic to test and mdxfind got status as below:

./mdxfind -t 4 -h ^md5$ -f /media/BackUp/Hash/hash-org/03-06-2014/*.txt /media/BackUp/MD5_dic/500-worst-passwords.dic >/media/BackUp/Hash/hash-org/03-06-2014/2.out

Working on hash types: MD5
Took 2 seconds to read hashes
Searching through 2492545 unique hashes from /media/BackUp/Hash/hash-org/03-06-2014/32_left_split_12.txt
There were 1 duplicate hashes on input
Maximum hash chain depth is 256
Minimum hash length is 32 characters
Working on /media/BackUp/Hash/hash-org/03-06-2014/32_left_split_15.txt w=1 line 2383125(198593) Found=106
Done - 4 threads caught
7,488,861 lines processed in 6 seconds
1248143.50 lines per second
4 total files
126 MD5x01 hashes found
126 Total hashes found

Here the content of 2.out :

MD5x01 cb1275796c089602837e7f5a6c8e06bd:d14377ce93a95c9d6d0d528b7e4a38fa
MD5x01 cbfbd96bc2994e04883df2d2fca036e4:d2a6ac49b7c871e729715d56be93a5c4
MD5x01 c1542729a6f9c54829733cb78cc310c6:d1565c2b5b2131f45a8bfa7138e9556e
MD5x01 c160d1779e7038ef024d78467e6e7c18:d3dbd30d3c99697f86406623413535d9
MD5x01 cb92ad8aeefe0dea7533bdf355868569:d059bb25483c03888ed44b1d59a8c42f
......

But when i try one file on each task like this:

./mdxfind -t 4 -h ^md5$ -f /media/BackUp/Hash/hash-org/03-06-2014/32_left_split_12.txt /media/BackUp/MD5_dic/500-worst-passwords.dic >/media/BackUp/Hash/hash-org/03-06-2014/3.out

Working on hash types: MD5
Took 3 seconds to read hashes
Searching through 2492545 unique hashes from /media/BackUp/Hash/hash-org/03-06-2014/32_left_split_12.txt
There were 1 duplicate hashes on input
Maximum hash chain depth is 256
Minimum hash length is 32 characters
Working on /media/BackUp/MD5_dic/500-worst-passwords.dic w=0 line 501(125) Found=0
Done - 4 threads caught
501 lines processed in 3 seconds
167.00 lines per second
1 total files
None found, sorry!

./mdxfind -t 4 -h ^md5$ -f /media/BackUp/Hash/hash-org/03-06-2014/32_left_split_13.txt /media/BackUp/MD5_dic/500-worst-passwords.dic >/media/BackUp/Hash/hash-org/03-06-2014/3.out

Working on hash types: MD5
Took 2 seconds to read hashes
Searching through 2523672 unique hashes from /media/BackUp/Hash/hash-org/03-06-2014/32_left_split_13.txt
Maximum hash chain depth is 255
Minimum hash length is 32 characters
Working on /media/BackUp/MD5_dic/500-worst-passwords.dic w=0 line 501(125) Found=0
Done - 4 threads caught
501 lines processed in 2 seconds
250.50 lines per second
1 total files
None found, sorry!

./mdxfind -t 4 -h ^md5$ -f /media/BackUp/Hash/hash-org/03-06-2014/32_left_split_14.txt /media/BackUp/MD5_dic/500-worst-passwords.dic >/media/BackUp/Hash/hash-org/03-06-2014/3.out

Working on hash types: MD5
Took 2 seconds to read hashes
Searching through 2491804 unique hashes from /media/BackUp/Hash/hash-org/03-06-2014/32_left_split_14.txt
There were 2 duplicate hashes on input
Maximum hash chain depth is 276
Minimum hash length is 32 characters
Working on /media/BackUp/MD5_dic/500-worst-passwords.dic w=0 line 501(125) Found=0
Done - 4 threads caught
501 lines processed in 2 seconds
250.50 lines per second
1 total files
None found, sorry!

./mdxfind -t 4 -h ^md5$ -f /media/BackUp/Hash/hash-org/03-06-2014/32_left_split_15.txt /media/BackUp/MD5_dic/500-worst-passwords.dic >/media/BackUp/Hash/hash-org/03-06-2014/3.out

Working on hash types: MD5
Took 2 seconds to read hashes
Searching through 2472882 unique hashes from /media/BackUp/Hash/hash-org/03-06-2014/32_left_split_15.txt
Maximum hash chain depth is 469
Minimum hash length is 32 characters
Working on /media/BackUp/MD5_dic/500-worst-passwords.dic w=0 line 501(125) Found=0
Done - 4 threads caught
501 lines processed in 2 seconds
250.50 lines per second
1 total files
None found, sorry!

Waffle, can you tell me what is problem ? I made some mistake in command ? and tell me why the results of 2.out are not in plain.

MD5x01 cb1275796c089602837e7f5a6c8e06bd:d14377ce93a95c9d6d0d528b7e4a38fa
MD5x01 cbfbd96bc2994e04883df2d2fca036e4:d2a6ac49b7c871e729715d56be93a5c4
MD5x01 c1542729a6f9c54829733cb78cc310c6:d1565c2b5b2131f45a8bfa7138e9556e
MD5x01 c160d1779e7038ef024d78467e6e7c18:d3dbd30d3c99697f86406623413535d9
MD5x01 cb92ad8aeefe0dea7533bdf355868569:d059bb25483c03888ed44b1d59a8c42f
......

I will ask you later affter try more.


Team Hashcat

BTC: 16s8xjDmAxvt2JtGKZbdrFdbZko8hjtw9D
bitcoincash: qrzu70gg2he89s6l2gd2v4ypjfw3gc24lgjuaqqxq3

XMPP: alotdv@xmpp.jp

Avatar
Waffle

Status: Elite
Joined: Wed, 02 Jan 2013
Posts: 284
Team: CynoSure Prime
Reputation: 357 Reputation
Offline
Tue, 03 Jun 2014 @ 22:51:54

alotdv said:

Today 03-06-2014 i download 4 hash file from hashes.org:
32_left_split_12.txt
32_left_split_13.txt
32_left_split_14.txt
32_left_split_15.txt
and put all into /media/BackUp/Hash/hash-org/03-06-2014/ folder. Only 4 TXT above file in the folder.

I using mini common DIC: 500-worst-passwords.dic to test and mdxfind got status as below:

./mdxfind -t 4 -h ^md5$ -f /media/BackUp/Hash/hash-org/03-06-2014/*.txt /media/BackUp/MD5_dic/500-worst-passwords.dic >/media/BackUp/Hash/hash-org/03-06-2014/2.out

First, thanks again for testing mdxfind. What you are doing, however, is different that what you think you are doing :-)

The correct code for this would be:

cat /media/BackUp/Hash/Hahs-org/03-06-2014/*.txt | mdxfind -t 4 /media/BackUp/MD5_dic/500-worst-passwords.dic >/media/BackUp/Hash/hash-org/03-06-2014/2.out


The command line, as you wrote it, would give the -f switch the first argument from the wildcard expansion, so it would read only the hashes from 32_left_split_12.txt. It would use the other expansions (32_left_split_13.txt, 32_left_split_14.txt, 32_left_split_15.txt, and the 500-worst-passwords.dic) as plaintexts to try.

Working on hash types: MD5
Took 2 seconds to read hashes
Searching through 2492545 unique hashes from /media/BackUp/Hash/hash-org/03-06-2014/32_left_split_12.txt
There were 1 duplicate hashes on input
Maximum hash chain depth is 256
Minimum hash length is 32 characters
Working on /media/BackUp/Hash/hash-org/03-06-2014/32_left_split_15.txt w=1 line 2383125(198593) Found=106
Done - 4 threads caught
7,488,861 lines processed in 6 seconds
1248143.50 lines per second
4 total files
126 MD5x01 hashes found
126 Total hashes found

Here the content of 2.out :

MD5x01 cb1275796c089602837e7f5a6c8e06bd:d14377ce93a95c9d6d0d528b7e4a38fa
MD5x01 cbfbd96bc2994e04883df2d2fca036e4:d2a6ac49b7c871e729715d56be93a5c4
MD5x01 c1542729a6f9c54829733cb78cc310c6:d1565c2b5b2131f45a8bfa7138e9556e
MD5x01 c160d1779e7038ef024d78467e6e7c18:d3dbd30d3c99697f86406623413535d9
MD5x01 cb92ad8aeefe0dea7533bdf355868569:d059bb25483c03888ed44b1d59a8c42f
......


So you can see that at least 126 of the hashes in 32_left_split_12.txt are "deeper than MD5($pass)".

For example, cb1275796c089602837e7f5a6c8e06bd is the MD5 result of hashing d14377ce93a95c9d6d0d528b7e4a38fa, so whatever d14377ce93a95c9d6d0d528b7e4a38fa is, cb1275796c089602837e7f5a6c8e06bd is one deeper :-)

The reason you didn't find it in the other, single file, tests, is because that hash wasn't present in the dictionary file, of course.


Using mdxfind as a pipeline is perhaps the most powerful mode, but it can be confusing (and I understand this). Cat your files in, don't use the -f switch for this.



Avatar
alotdv

Status: Trusted
Joined: Thu, 10 May 2012
Posts: 1330
Team:
Reputation: 1445 Reputation
Offline
Wed, 04 Jun 2014 @ 08:04:38

Oop, i made wrong command

Can i pipe wordlist to mdxfind like JTR ? Just see that i can pipe hashes to mdxfind.
There is restore command in mdxfind ?

I've been loading 54500011 hashes to mdxfind with no problem that i can't when use JTR, HC+ and PasswordPro.


Team Hashcat

BTC: 16s8xjDmAxvt2JtGKZbdrFdbZko8hjtw9D
bitcoincash: qrzu70gg2he89s6l2gd2v4ypjfw3gc24lgjuaqqxq3

XMPP: alotdv@xmpp.jp

Avatar
Waffle

Status: Elite
Joined: Wed, 02 Jan 2013
Posts: 284
Team: CynoSure Prime
Reputation: 357 Reputation
Offline
Wed, 04 Jun 2014 @ 08:18:03

alotdv said:

Oop, i made wrong command

Can i pipe wordlist to mdxfind like JTR ? Just see that i can pipe hashes to mdxfind.
There is restore command in mdxfind ?

I've been loading 54500011 hashes to mdxfind with no problem that i can't when use JTR, HC+ and PasswordPro.

Yes, I normally process more than 85M hashes at a time here. mdxfind is very, very efficient at storing hashes in memory, and the number of hashes does not significantly reduce the speed (unless your memory system is really crappy :-)

Yes, you can pipe wordlists to mdxfind. I use this technique regularly. Let's say you have a program to permute words in a particular way...

mknod p /tmp/np1
nohup permute /in/file/list >/tmp/np1 &
cat /all/my/hashes/*.txt | mdxfind -i 5 -h ^md5$,^sha1$,^md5md5pass$,^md5sha1$ /tmp/np1 >myfound1.res

There is no restore command in mdxfind, primarily because it does not "change" anything. All files are opened read-only, and always read sequentially and never rewound. While I understand the desire to "restore", I can't really see a benefit. What am I missing? If you interrupt a session, just restart it! Processing a few billion words takes about as much time as copying the wordlists, so isn't a big deal.

With rules, I do understand that there might need to be a reason to restart "where you left off", but...

Help me to understand what a restore would do for you?


Avatar
yhi

Status: Banned
Joined: Tue, 05 Nov 2013
Posts: 875
Team:
Reputation: 365 Reputation
Offline
Mon, 06 Oct 2014 @ 21:17:12

WARNING! User is BANNED and maybe a SCAMMER.

i also want this :'(


Avatar
Tutankhamun

Status: n/a
Joined: Mon, 06 Oct 2014
Posts: 11
Team:
Reputation: 19 Reputation
Offline
Thu, 09 Oct 2014 @ 18:11:30

I am Linux user and would love to give this a try if your still looking for testers or just want to share


BTC: 1EMxApmBZBaynnJQ8WivV4gavQiAM5ffAH

Avatar
yhi

Status: Banned
Joined: Tue, 05 Nov 2013
Posts: 875
Team:
Reputation: 365 Reputation
Offline
Tue, 11 Nov 2014 @ 17:10:40

WARNING! User is BANNED and maybe a SCAMMER.

how to use it ?
i am getting problem
PS i am using 32 bit linux


Avatar
s3in!c
Moderator
Status: Elite
Joined: Wed, 10 Apr 2013
Posts: 806
Team:
Reputation: 1133 Reputation
Online
Tue, 11 Nov 2014 @ 19:04:18

No one has a 32bit version of MDXFind, just because there is no binary released of it by Waffle.

And I doubt that he will release any at some time, because it will be work and nearly no one is using 32bit only these times. Also it could be problematic as 32bit is more complicated to deal with really large numbers.

I really recommend you to switch to 64bit on at least one computer and try it then.


+Rep if I helped

Hashes.org - Powerful Community Password Recovery
Hashtopolis - Hashcat distributed cracking tool

BTC: 1VTuiKrNoytU1PvYrF3J7VapQ9oPg93Jn

Avatar
yhi

Status: Banned
Joined: Tue, 05 Nov 2013
Posts: 875
Team:
Reputation: 365 Reputation
Offline
Wed, 12 Nov 2014 @ 11:36:23

WARNING! User is BANNED and maybe a SCAMMER.

hashes.org said:

I really recommend you to switch to 64bit on at least one computer and try it then.


i only have one old desktop & i cant afford new one
any other way ?
or any alternative of mdx find ????


Avatar
Hash-IT

Status: Trusted
Joined: Tue, 02 Aug 2011
Posts: 4598
Team: HashKiller
Reputation: 3003 Reputation
Offline
Wed, 12 Nov 2014 @ 12:15:56

yhi said:


any other way ?

No

yhi said:


or any alternative of mdx find ????

There is nothing that compares to it.


Please read the forum rules. | Please read the paid section rules.

BTC: 1MmWESN5bKZ1YSuHrm5uNwnQYxWyQnEQ6E

Avatar
yhi

Status: Banned
Joined: Tue, 05 Nov 2013
Posts: 875
Team:
Reputation: 365 Reputation
Offline
Wed, 12 Nov 2014 @ 15:22:46

WARNING! User is BANNED and maybe a SCAMMER.

Hash-IT said:


There is nothing that compares to it.


hm..
maybe there is nothing who is fast like it
but is there is any other way to crack mdx ??

i have a 200MB list of MDX hashes



Avatar
yhi

Status: Banned
Joined: Tue, 05 Nov 2013
Posts: 875
Team:
Reputation: 365 Reputation
Offline
Sun, 16 Nov 2014 @ 05:55:54

WARNING! User is BANNED and maybe a SCAMMER.

i have a question
how many hash types mdx find support ??
& will you please give me algo list ??


Avatar
s3in!c
Moderator
Status: Elite
Joined: Wed, 10 Apr 2013
Posts: 806
Team:
Reputation: 1133 Reputation
Online
Sun, 16 Nov 2014 @ 10:27:56

yhi said:

i have a question
how many hash types mdx find support ??
& will you please give me algo list ??

On the first post of this thread you will find a list of hash algorithms which are supported by MDXFind:
https://hashes.org/forum/showthread.php?tid=35


+Rep if I helped

Hashes.org - Powerful Community Password Recovery
Hashtopolis - Hashcat distributed cracking tool

BTC: 1VTuiKrNoytU1PvYrF3J7VapQ9oPg93Jn


24 Results - Page 1 of 1 -
1

We have a total of 162956 messages in 20469 topics.
We have a total of 19222 registered users.
Our newest registered member is febrian1.