Noob question: md5 salted unix unknown password cracking
#3
many people here start with the hashes.org "founds" lists for plaintexts as they are a clean source of good passwords for unknown sources. these mixed with a good ruleset (OneRuleToRuleThemAll, etc.) may yield the plain. hashes.org does also have a hash -> plain lookup in case the hash has already been seen and cracked by someone in the community.

$1$ (md5crypt) is a pretty weak hash; a single radeon vii can do about 11500 kH/sec. this is within the realm of low-character brute-force with some ok computational power.
Reply


Messages In This Thread
RE: Noob question: md5 salted unix unknown password cracking - by rarecoil - 12-23-2019, 10:29 AM