NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Found Passwords from Not Found Lists - New algo found in 40_hex, sha1(md5($pass).$pass)


2 Results - Page 1 of 1 -
1
Author Message
Avatar
zyx4cba

Status: n/a
Joined: Tue, 22 Nov 2011
Posts: 52
Team:
Reputation: 31 Reputation
Offline
Tue, 13 Mar 2012 @ 05:26:09

Found new formula in today's 40_hex, sha1(md5($pass).$pass), with '.' being string the concatenation operator.

3 examples found:
e91199d07f6c26b7cceaa20cf627b7768806e32f:fe01ce2a7fbac8fafaed7c982a04e229demo:fe01ce2a7fbac8fafaed7c982a04e229:demo
d337b087bc9bd37263cb2b4e2001d8dea64732ce:e99a18c428cb38d5f260853678922e03abc123:e99a18c428cb38d5f260853678922e03:abc123
8e28bd425182081fe14bcfdef98e2a9b1ab0e924:8f036369a5cd26454949e594fb9e0a2dlol123:8f036369a5cd26454949e594fb9e0a2d:lol123


Avatar
blandyuk
Administrator
Status: Trusted
Joined: Tue, 05 Jul 2011
Posts: 3205
Team: HashKiller
Reputation: 7744 Reputation
Online
Tue, 13 Mar 2012 @ 08:36:35

Just run that thru one of my lists and I found:

Code:
ab8df89f4f138d3a71a9e2ca9cc073175e1e0786:loligertest123
e29b4096a0fa74b460fe08030301c0b3932fc58a:w7w7y46.
8e28bd425182081fe14bcfdef98e2a9b1ab0e924:lol123
3237a28a944c370bab5b531a8e31fb4bc698b936:585858
545edfab237fd36cd049a5dd218d668abc553bd2:brak1234
e91199d07f6c26b7cceaa20cf627b7768806e32f:demo
1e7ae83d3533a41b66f31c44ccc15c117aab24ec:puschel2
ac55f4a6d840e68b16d151318be217be7c9c7cc0:penis123
d337b087bc9bd37263cb2b4e2001d8dea64732ce:abc123


Please read the forum rules | Please read the paid section rules


2 Results - Page 1 of 1 -
1

We have a total of 212187 messages in 26017 topics.
We have a total of 23011 registered users.
Our newest registered member is hashmaster9000.