Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 797
» Latest member: buglecamera03
» Forum threads: 74
» Forum posts: 305

Full Statistics

Online Users
There are currently 10 online users.
» 0 Member(s) | 8 Guest(s)
Bing, Google

Latest Threads
$HEX - Plains inside foun...
Forum: Technical
Last Post: s3in!c
05-13-2019, 11:08 AM
» Replies: 1
» Views: 512
WPA |Does any1 crack them...
Forum: General
Last Post: mysterdee888
04-19-2019, 02:57 PM
» Replies: 0
» Views: 402
dubsmash hash decrypt hel...
Forum: General
Last Post: midireprivada
04-10-2019, 07:29 PM
» Replies: 2
» Views: 898
Suggestions for Massive C...
Forum: General
Last Post: jfoster
04-10-2019, 02:31 AM
» Replies: 0
» Views: 616
hash cracking on SBCs
Forum: Application Usage / Bugs
Last Post: DerpUP
03-31-2019, 07:31 PM
» Replies: 0
» Views: 383
myheritage hash decrypt h...
Forum: General
Last Post: beaverfever
03-14-2019, 03:33 AM
» Replies: 3
» Views: 1,281
[ASK/HELP] What kind of H...
Forum: General
Last Post: superherolarry
02-27-2019, 10:52 PM
» Replies: 4
» Views: 1,673
Hashes.Org Left Manager (...
Forum: General
Last Post: s3in!c
02-27-2019, 04:53 PM
» Replies: 17
» Views: 49,101
Solving Junk Founds
Forum: General
Last Post: s3in!c
02-27-2019, 04:51 PM
» Replies: 3
» Views: 4,682
Why does ^BCRYPTMD5$ take...
Forum: General
Last Post: s3in!c
02-18-2019, 01:34 PM
» Replies: 1
» Views: 5,500

 
  $HEX - Plains inside founds
Posted by: hashy - 05-08-2019, 08:16 AM - Forum: Technical - Replies (1)

Just to mention:

In the junk list there seem to be "plains" like $HEX[313233].
After dehexing them i found, that there are even iterated versions
e.g. $HEX[244845585b...]

Print this item

  WPA |Does any1 crack them $$$
Posted by: mysterdee888 - 04-19-2019, 02:57 PM - Forum: General - No Replies

Hi i  a wpa file .cap or .hccapx Can sum1 crack it for me please

i can pay by bitcoin if cracked thanks.

Print this item

  Suggestions for Massive Cluster Demonstration
Posted by: jfoster - 04-10-2019, 02:31 AM - Forum: General - No Replies

I'm working with a group that is planning a demonstration of a 50 trillion MD5/s cracking cluster.

I'm curious if anyone has a suggestion of a leaked DB that would be an interesting benchmark to test a decent attack plan against with this kind of fire power. Doesn't have to be MD5.

Print this item

  hash cracking on SBCs
Posted by: DerpUP - 03-31-2019, 07:31 PM - Forum: Application Usage / Bugs - No Replies

My favorite thing about mdxfind is it's ability to run on SBCs, it doesn't provide the most power but for hashes like bcrypt or when you have a high value hash you're about to give up on just run it through mdxfind and check on it a month later. The vast majority use less than 10w under full load so they're ideal long term passive cracking attacks without tying up your main workstations. 

I'm going to be trying out a few different brands to see how they compare and thought i'd share some quick benchmarks. 

First up is the le potato by libre computer: 

https://www.amazon.com/gp/product/B074N5B8KZ

Quad 64-bit 1.5GHz ARM Cortex-A53
1GB DDR3
$30 USD

kill a watt meter readings while cracking bcrypt
peak = 3.8 watts
avg = 3.6 watts

MD5 - 3059917.40 lines per second

Quote:Done - 4 threads caught
15,299,587 lines processed in 5 seconds
3059917.40 lines per second
4.48 seconds hashing, 15,299,587 total hash calculations

BCRYPT (cost=08) - 81.22 lines per second

Quote:Done - 4 threads caught
1,722,926 lines processed in 21212 seconds
81.22 lines per second
21212.03 seconds hashing, 1,722,926 total hash calculations

BCRYPTMD5 (Edmodo) - 5.13 lines per second

Quote:Done - 4 threads caught
5,411 lines processed in 1055 seconds
5.13 lines per second
1055.16 seconds hashing, 10,822 total hash calculations

PBKDF2-SHA256 - 132.00 lines per second

Quote:Done - 4 threads caught
5,412 lines processed in 41 seconds
132.00 lines per second
41.13 seconds hashing, 5,412 total hash calculations
0.00M hashes per second (approx)

Whirlpool - 789601.00 lines per second

Quote:Done - 4 threads caught
2,368,803 lines processed in 3 seconds
789601.00 lines per second
2.89 seconds hashing, 2,368,803 total hash calculations

Print this item

  dubsmash hash decrypt help
Posted by: midireprivada - 03-30-2019, 03:34 PM - Forum: General - Replies (2)

pbkdf2_sha256$20000$qYlB7pHevnPJ$RoOBcC7W2nybEBTp/KlYEumpgqlMXPBSU6Nh6xnWTdU=
pbkdf2_sha256$20000$y9E44LTNRaHr$Iorx34HH7BG7o/cOahc5qbeHESggBhM4BtFsEVZ/JG4=
pbkdf2_sha256$24000$F0fKEBDmjCdP$Wl40HiF0bggw9vfIiX89EQI/IbpL416a2eRzf6DFVP8=
pbkdf2_sha256$15000$D5OpPyQhrMVj$90I4BwyNa6R02C8J4G96DsFtFguOH/392dJ9KpIPBtc=
pbkdf2_sha256$24000$5qWBvTVSon1P$AW38Dd7oOVus+auPmDRtvv1e+Sg54bOtJqhQjBfCPUs=
pbkdf2_sha256$20000$dF2QayCEl8r5$K9nBq6Rmo1TGf9hroCjiHuQUiV8Gt/QDBY86/T7bRIc=
pbkdf2_sha256$20000$DEvbfr88ce38$ayaFVZUfV6y89RiNYEjn3PnQ1LHiv7qsf+3DPnUAqnw=
pbkdf2_sha256$15000$X6wT1MfTxDWA$TrHokM9de3Pl1Kqr6vxt5q+rvTXuyClfpDaRGyIE+rA=
pbkdf2_sha256$24000$XPrxl0mYSEvM$AgWljBZBmIt7wY4txExmlh1rm3qJPpnZW0ycnSEYhCM=
pbkdf2_sha256$20000$VYFpqiVw9hEL$uWbG+7of+TYstOLjmugO6phpS8rzC29YMDd1xALbxGU=
pbkdf2_sha256$15000$RW6iFoGD9jDa$hzcqxctLuQZWkNWzGTH0nRSkqQHgrS9ANSSuxWUlGPw=


can anybody helpme with this hasshes?

Print this item

  myheritage hash decrypt help
Posted by: beaverfever - 03-12-2019, 01:13 AM - Forum: General - Replies (3)

i need help decrypting these hashes

Hash: a3e8b5d391a237aed27e17e5a758792d48225566
Salt:
20111224114010

Hash: b42e7ae2cf21368e9c90690e8b38f827f1382f48
Salt:
20120623120416

Print this item

  [ASK/HELP] What kind of Hashs are these?
Posted by: superherolarry - 02-23-2019, 09:43 PM - Forum: General - Replies (4)

I've been trying to get the passwords from these for days but to no avail, i guess they're not the right hashes? any help would be appreciated and rewarded if necessary! 


Hash:- 27086a714f6ed1d60d086b25f6beb54e93a10436fe1a3996e6a0a590b55d3346bd091c2a3bbe18a8afc648da8d49a4d27bde2f825c3f0640dd5a11365780a805
Salt:
sJWqfeetawPPS2Su4Dvh


Hash: $2a$10$m0C.B/DcSc3KR9N6LnU.JuDGq3h7qCcOgrYFIf.2XeSy6PEBCrTvm

Print this item

  Why does ^BCRYPTMD5$ take so long?
Posted by: Mikerowe - 02-18-2019, 01:09 PM - Forum: General - Replies (1)

I've been experimenting on some Edmodo hashes and using MDXfind, i've found that i have a rate of roughly 20-60 hashes per second. Is this an expected speed due to the nature of the Bcrypt hashing algorithm, or should it be faster than this? 
using an 8 cores on an fx8320 if that helps

cheers  Big Grin

Print this item

  Solving Junk Founds
Posted by: Caseynova - 02-18-2019, 03:44 AM - Forum: General - Replies (3)

I've been doing some analysis of the founds and in particular the "junks". Quite a lot of these are just misdiagnosed original hashes and can still be solved.

E.g. a MD5X2 hash has been cracked as MD5, giving the "inner" MD5 hash as the "password" which then gets identified as a junk result. 

Now I'm happy to clean up the "junk" and in the example above, recrack the original hash as MD5X2, but my question is, whether once flagged as "found", a new upload will overwrite the currently incorrect algorithm and password?

Print this item

Exclamation Forum Rules
Posted by: s3in!c - 02-15-2019, 05:59 PM - Forum: General - No Replies

Not respecting the rules can lead to instant ban or warnings, depending on the type of violation. The rules might be updated without explicitly notifying the user.

We are not a hacking site. Requests dealing with anything potentially illegal or questionable material will be dealt with accordingly.

  • No double posting or unnecessary bumping.
  • Do not post any personal details, always mask specific data (IPs, names, etc.).
  • Only post hash cracking request for hashes which are not supported by Hashes.org automatically.
  • No thread hijacking.
  • Language is English, posts in other languages will be removed.
  • Describe problems/questions appropriately and name your topic accordingly (also no caps lock texts).
  • No advertising/selling/spam topics.
  • When having large text files (e.g. logs) don't put them in the text, use attachments instead.

Print this item