Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 842
» Latest member: BeckySpencer
» Forum threads: 76
» Forum posts: 307

Full Statistics

Online Users
There are currently 14 online users.
» 0 Member(s) | 13 Guest(s)
Bing

Latest Threads
help me please...
Forum: General
Last Post: al1ne3737
06-05-2019, 07:38 PM
» Replies: 0
» Views: 461
[Ask/Help] Sha1 and Hash ...
Forum: General
Last Post: tablesecurity
06-03-2019, 08:56 PM
» Replies: 0
» Views: 401
$HEX - Plains inside foun...
Forum: Technical
Last Post: s3in!c
05-13-2019, 11:08 AM
» Replies: 1
» Views: 1,633
WPA |Does any1 crack them...
Forum: General
Last Post: mysterdee888
04-19-2019, 02:57 PM
» Replies: 0
» Views: 1,062
dubsmash hash decrypt hel...
Forum: General
Last Post: midireprivada
04-10-2019, 07:29 PM
» Replies: 2
» Views: 1,811
Suggestions for Massive C...
Forum: General
Last Post: jfoster
04-10-2019, 02:31 AM
» Replies: 0
» Views: 1,154
hash cracking on SBCs
Forum: Application Usage / Bugs
Last Post: DerpUP
03-31-2019, 07:31 PM
» Replies: 0
» Views: 793
myheritage hash decrypt h...
Forum: General
Last Post: beaverfever
03-14-2019, 03:33 AM
» Replies: 3
» Views: 2,235
[ASK/HELP] What kind of H...
Forum: General
Last Post: superherolarry
02-27-2019, 10:52 PM
» Replies: 4
» Views: 2,766
Hashes.Org Left Manager (...
Forum: General
Last Post: s3in!c
02-27-2019, 04:53 PM
» Replies: 17
» Views: 50,997

 
  I had to fix up the haskbase list
Posted by: 0xdeadbeef - 09-23-2018, 03:10 PM - Forum: Technical - Replies (2)

The hackbase list of hashes that were not yet cracked had some issues, with invalid tokens and missing separator for those with no salts.

I fixed them up and got a few hashes. Only got 17 of them with vBulletin < v3.8.5, hashcat mode 2611 once they were fixed up.

If there's no salt, add the colon. For some reason the hashes sometimes had ' on the end before the colon, which gave it an invalid token length. Once they were removed, and colons added for those without salts, there were no issues with invalid formatting.

Fixed hackbase list on request.

Print this item

  Supported hash type
Posted by: freeroute - 06-29-2018, 08:44 AM - Forum: Technical - Replies (2)

Hash type: md5($salt.sha1($salt.$pass)) supperted by mdxfind?

Thanks,

Print this item

  mdxfind install CLI only
Posted by: freeroute - 06-27-2018, 06:41 AM - Forum: Technical - Replies (2)

Hi,

Can be installed mxfind on Ubuntu OS without GUI?
I have only CLI (command line terminal), because it is a remote VPS.

root@KissT:~# lsb_release --all
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 16.04.4 LTS
Release: 16.04
Codename: xenial

Thanks for your help.

Print this item

  API + Lists Hashcat Code
Posted by: andydis - 06-21-2018, 02:07 PM - Forum: Technical - Replies (3)

Can the API + Lists include the hastcat code ( -m code) ?

Print this item

  How to crack edmodo passwords with hashcat?
Posted by: Virgula001 - 06-11-2018, 08:13 PM - Forum: General - Replies (5)

Hello forum, I need to know how is possible a wordlist attack with hashcat against bcryptmd5 Edmodo hash?
How can I set properly hashcat in order to do that?
Thanks

Print this item

  Can someone share the we heart it database?
Posted by: inigoba2 - 06-10-2018, 01:32 PM - Forum: General - Replies (1)

it would be very nice, thank you.

Print this item

  New user; need some help submitting founds.
Posted by: red_rebel - 05-13-2018, 08:58 PM - Forum: General - Replies (1)

Hey guys, first of all thanks for having this community; I love it already and I've been looking for a place like this.

I started practicing with my new cracking rig on the Game-Tuts VBulletin Database of hashes. I have idk, maybe 20 or 50 so far, but just starting cracking.

I have a potfile from Hashcat, in .potfile (can be converted to .txt or pretty much whatever) in the following format:

Code:
74fb67bf1473bbdeb85e458b60ce4df4:d&*:24green
6ebbaf67dcc2790ea362ff05f05dfae1:~c*:21sean
54fa8445863078c137b905fa1cbe7741:J-+:77password

I was going to upload the found, but I had some questions about filling out the form, and already having read https://hashes.org/algorithms.php and https://s3inlc.wordpress.com/2017/11/10/...hashes-org, I figured I'd come here since I still quite didn't get it.

What exactly do I need for fill out for "Algorithm?" The Game-Tuts database is VBulletin, but I'm sure I don't just type that in plaintext by the look of the above websites. If I have to get a string or something to feed the algorithm to Hashes.org, I'm not sure where or how to do so.

Also a bit confused on Hash/Salt/Found Separator. Looking at my above potfile, I'd assume I would submit the following in that field:

::

Since there's two colons to seperate hash and salt, right?

Then I guess, "Found hashes are salted" is simple. I'd check yes in this case, but if my list looked like,

54fa8445863078c137b905fa1cbe7741:77password

...with no salt, I'd not check it.

Thanks for confirming or denying this stuff, and answering these questions anyone / everyone! Happy to be here Smile

Print this item

  MDXFind uploading founds
Posted by: Vetronexe - 03-25-2018, 11:05 AM - Forum: Application Usage / Bugs - Replies (1)

I am getting a lot of finds using MDXfind vs the 32hex left list but do not understand how to upload them to the site.

Any advice is appreciated.

vetronexe

Print this item

  Urgent - Need help to decrypt iTunes backup
Posted by: Dondunca - 03-14-2018, 05:08 PM - Forum: General - Replies (1)

Hi everyone

I am pretty new to this but somehow iTunes created an encrypted backup with a new password. Usually it would use the password used for the previous backups which is not the case. I have tried 2 softwares to brute force it already but it is taking too long ( 1 week + already).

I am in desperately need of help, I have got 10 years worth of pictures on that backup and in the meantime I broke my iPhone which got reset by these Apple Geniuses.

I will take all the help that I can get. I have a modest sum of <B><s></s>50$ in btc as a reward <e></e></B>( not sure that I can do this here) for a kind soul that will agree to help.

Thanks a lot!

Print this item

  Leaked password lists NOT uniq
Posted by: kelodi - 02-28-2018, 11:43 AM - Forum: General - Replies (3)

Hi,
I'm currently playing with two projects related to AI and password cracking.
First one is PassGAN model (https://github.com/brannondorsey/PassGAN) to generate new passwords based on leaked password lists. The first results are quite promising although I have issues with finding good dictionaries that are not uniq.
Verification of results is based on checking how much new passwords can be found in hash list that contain 306m valid hashes (hash sorce: https://haveibeenpwned.com/Passwords V1; 3 Aug 2017).
So for example after generating new password list based on uniq rockyou that contain 1m new passwords, around 11% of them can be found in 306m has list (so from 1m of new passwords, around 100k corresponds with big hash list).
In compere with also rockyou list but one that is not uniq, it gave me around 22% of hits.

So my question is, do you have a password lists that are not uniq? I would be very interested especially in LinkedIn list but of course I'm not limited to this list. And if you have, are you willing to share it with me?
List will be used to build new big dictionary and try this against some hash lists that can be found on hashes.org website. Of course all new cracked passwords will be uploaded.

Second project is about brute force approach of password cracking but this is something not to share yet Smile

Print this item