Posts: 1
Threads: 1
Joined: Jun 2012
Alright so here's the deal. I got a hash and although I can't seem to find the option to decrypt it on hashcat, I've seen people talk about this hash on this forum and they decrypt it too. so i was wondering if someone could either decrypt it for me and tell me how to do so myself, or just one of the above
thanks guys! heres the hash!:
c4ca207992f72f3eb0bc59429ab0e447:C!AT@
Salted MD5(md5(md5($salt).md5($pass))
Posts: 2,301
Threads: 11
Joined: Jul 2010
Posts: 621
Threads: 57
Joined: May 2010
(06-29-2012, 09:07 AM)undeath Wrote: vb < 3.8.5
No, IPB, so -m 2811.
However, unless the rules have changed, the initial post should be a ban.
Posts: 5,185
Threads: 230
Joined: Apr 2010
(06-30-2012, 05:28 AM)mastercracker Wrote: However, unless the rules have changed, the initial post should be a ban.
I looked up the hash on google and was unable to find it. Also it looks like this is a self-made hash (cause of the salt/plain). Thats why I did not ban him.
Posts: 414
Threads: 14
Joined: Mar 2012
Code:
His algo is: md5(md5(md5($salt).md5($pass))
-m2611, -m2711: md5(md5($salt).md5($pass))
-m2811: md5(md5($pass).$salt)
But, this still can be done if you hash(MD5) your salt.
Look at the code above you will understand.
Posts: 621
Threads: 57
Joined: May 2010
(06-30-2012, 02:29 PM)M@LIK Wrote: Code:
His algo is: md5(md5(md5($salt).md5($pass))
-m2611, -m2711: md5(md5($salt).md5($pass))
-m2811: md5(md5($pass).$salt)
But, this still can be done if you hash(MD5) your salt.
Look at the code above you will understand.
I think that you have inverted them M@LIK. Just to make sure also that we are talking of the same thing, I am using the OCLhascat-plus modes.
-m 2611 and -m 2711 are for Vbulletin which are md5(md5($pass).$salt).
-m 2811 is for IPB and MyBB which are md5(md5($salt).md5($pass)).
Posts: 414
Threads: 14
Joined: Mar 2012
Ahh... Yes, you're right, don't know how I missed that.