NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - Found Passwords from Not Found Lists - Went through 32 char hex and I'm confused


3 Results - Page 1 of 1 -
1
Author Message
Avatar
hannhimhe

Status: n/a
Joined: Tue, 06 Jan 2015
Posts: 4
Team:
Reputation: 0 Reputation
Offline
Wed, 07 Jan 2015 @ 23:46:59

So, I went through 32 char hex and I'm finding some really weird plains (see attached file). I don't want to spoil it for you but if you scroll down to row 9032 you should see it.

My question is simple. Why?


Attachments: Login to view attachments.
Avatar
coolbry95

Status: n/a
Joined: Wed, 11 Sep 2013
Posts: 78
Team:
Reputation: 36 Reputation
Offline
Thu, 08 Jan 2015 @ 02:41:24

That is not weird at all. It is from people hashing with one function then another. It happens a lot..


AMD FX-8350 and 4x R9 290X

Avatar
hannhimhe

Status: n/a
Joined: Tue, 06 Jan 2015
Posts: 4
Team:
Reputation: 0 Reputation
Offline
Thu, 08 Jan 2015 @ 16:23:06

Yeah, I know this but why is this such a common practice? Since this is hashes that end up in the wild the systems are not secure to begin with. What can be gained from md5-hashing a phpass-hash that you do not get from ie bcrypt with cost >10 and a sane password policy?



3 Results - Page 1 of 1 -
1

We have a total of 205947 messages in 25390 topics.
We have a total of 22555 registered users.
Our newest registered member is happyfeet.