Welcome, Guest
You have to register before you can post on our site.



Search Forums

(Advanced Search)

Forum Statistics
» Members: 883
» Latest member: mizan
» Forum threads: 77
» Forum posts: 309

Full Statistics

Online Users
There are currently 18 online users.
» 0 Member(s) | 17 Guest(s)

Latest Threads
Pkzip2 plaintext
Forum: General
Last Post: s3in!c
07-15-2019, 10:07 AM
» Replies: 1
» Views: 199
help me please...
Forum: General
Last Post: al1ne3737
06-05-2019, 07:38 PM
» Replies: 0
» Views: 824
[Ask/Help] Sha1 and Hash ...
Forum: General
Last Post: tablesecurity
06-03-2019, 08:56 PM
» Replies: 0
» Views: 715
$HEX - Plains inside foun...
Forum: Technical
Last Post: s3in!c
05-13-2019, 11:08 AM
» Replies: 1
» Views: 2,211
WPA |Does any1 crack them...
Forum: General
Last Post: mysterdee888
04-19-2019, 02:57 PM
» Replies: 0
» Views: 1,391
dubsmash hash decrypt hel...
Forum: General
Last Post: midireprivada
04-10-2019, 07:29 PM
» Replies: 2
» Views: 2,351
Suggestions for Massive C...
Forum: General
Last Post: jfoster
04-10-2019, 02:31 AM
» Replies: 0
» Views: 1,460
hash cracking on SBCs
Forum: Application Usage / Bugs
Last Post: DerpUP
03-31-2019, 07:31 PM
» Replies: 0
» Views: 1,030
myheritage hash decrypt h...
Forum: General
Last Post: beaverfever
03-14-2019, 03:33 AM
» Replies: 3
» Views: 2,766
[ASK/HELP] What kind of H...
Forum: General
Last Post: superherolarry
02-27-2019, 10:52 PM
» Replies: 4
» Views: 3,428

  Pkzip2 plaintext
Posted by: Normaluser - 07-14-2019, 02:42 PM - Forum: General - Replies (1)


I have a zip with 3 files inside pkzip2 encrypted plus 1 folder unencrypted. 
1 of 3 files is a plaintext with 6 lines an 123 characters. I have this file unencrypted
Is it possible attack a pkzip2 with this info?

Thank so much

Print this item

  help me please...
Posted by: al1ne3737 - 06-05-2019, 07:38 PM - Forum: General - No Replies

this password is from a client of mine, and I have to retrieve it for it, can someone help me? hash md5


Print this item

  [Ask/Help] Sha1 and Hash help
Posted by: tablesecurity - 06-03-2019, 08:56 PM - Forum: General - No Replies

Can someone help me with this hash: d45d01d48126a6049c78ff1c1190ffd027903d23 and salt: 3acd3a803a220ce0b4a511a143eb62bd3301f68e

From doing some research I found some people mention the algorithm is sha1('--'.$salt.'--'.$pass.'--')
and in hashcat I would need to convert hashConfusedsalt format to hash:--salt-- and run with $-$- rule. Hashcat mode is -m 120. 

I can't seem to get it to work so curious if anyone can help or take a crack at it themselves and then help me understand what I was doing wrong? 

Hope that is enough info. Thanks!

Print this item

  $HEX - Plains inside founds
Posted by: hashy - 05-08-2019, 08:16 AM - Forum: Technical - Replies (1)

Just to mention:

In the junk list there seem to be "plains" like $HEX[313233].
After dehexing them i found, that there are even iterated versions
e.g. $HEX[244845585b...]

Print this item

  WPA |Does any1 crack them $$$
Posted by: mysterdee888 - 04-19-2019, 02:57 PM - Forum: General - No Replies

Hi i  a wpa file .cap or .hccapx Can sum1 crack it for me please

i can pay by bitcoin if cracked thanks.

Print this item

  Suggestions for Massive Cluster Demonstration
Posted by: jfoster - 04-10-2019, 02:31 AM - Forum: General - No Replies

I'm working with a group that is planning a demonstration of a 50 trillion MD5/s cracking cluster.

I'm curious if anyone has a suggestion of a leaked DB that would be an interesting benchmark to test a decent attack plan against with this kind of fire power. Doesn't have to be MD5.

Print this item

  hash cracking on SBCs
Posted by: DerpUP - 03-31-2019, 07:31 PM - Forum: Application Usage / Bugs - No Replies

My favorite thing about mdxfind is it's ability to run on SBCs, it doesn't provide the most power but for hashes like bcrypt or when you have a high value hash you're about to give up on just run it through mdxfind and check on it a month later. The vast majority use less than 10w under full load so they're ideal long term passive cracking attacks without tying up your main workstations. 

I'm going to be trying out a few different brands to see how they compare and thought i'd share some quick benchmarks. 

First up is the le potato by libre computer: 


Quad 64-bit 1.5GHz ARM Cortex-A53
$30 USD

kill a watt meter readings while cracking bcrypt
peak = 3.8 watts
avg = 3.6 watts

MD5 - 3059917.40 lines per second

Quote:Done - 4 threads caught
15,299,587 lines processed in 5 seconds
3059917.40 lines per second
4.48 seconds hashing, 15,299,587 total hash calculations

BCRYPT (cost=08) - 81.22 lines per second

Quote:Done - 4 threads caught
1,722,926 lines processed in 21212 seconds
81.22 lines per second
21212.03 seconds hashing, 1,722,926 total hash calculations

BCRYPTMD5 (Edmodo) - 5.13 lines per second

Quote:Done - 4 threads caught
5,411 lines processed in 1055 seconds
5.13 lines per second
1055.16 seconds hashing, 10,822 total hash calculations

PBKDF2-SHA256 - 132.00 lines per second

Quote:Done - 4 threads caught
5,412 lines processed in 41 seconds
132.00 lines per second
41.13 seconds hashing, 5,412 total hash calculations
0.00M hashes per second (approx)

Whirlpool - 789601.00 lines per second

Quote:Done - 4 threads caught
2,368,803 lines processed in 3 seconds
789601.00 lines per second
2.89 seconds hashing, 2,368,803 total hash calculations

Print this item

  dubsmash hash decrypt help
Posted by: midireprivada - 03-30-2019, 03:34 PM - Forum: General - Replies (2)


can anybody helpme with this hasshes?

Print this item

  myheritage hash decrypt help
Posted by: beaverfever - 03-12-2019, 01:13 AM - Forum: General - Replies (3)

i need help decrypting these hashes

Hash: a3e8b5d391a237aed27e17e5a758792d48225566

Hash: b42e7ae2cf21368e9c90690e8b38f827f1382f48

Print this item

  [ASK/HELP] What kind of Hashs are these?
Posted by: superherolarry - 02-23-2019, 09:43 PM - Forum: General - Replies (4)

I've been trying to get the passwords from these for days but to no avail, i guess they're not the right hashes? any help would be appreciated and rewarded if necessary! 

Hash:- 27086a714f6ed1d60d086b25f6beb54e93a10436fe1a3996e6a0a590b55d3346bd091c2a3bbe18a8afc648da8d49a4d27bde2f825c3f0640dd5a11365780a805

Hash: $2a$10$m0C.B/DcSc3KR9N6LnU.JuDGq3h7qCcOgrYFIf.2XeSy6PEBCrTvm

Print this item