Posts: 230
Threads: 4
Joined: Aug 2015
Just spotted this:
http://cynosureprime.blogspot.se/2015/09...shley.html
11.2 million passwords recovered so far - would be a nice addition to anyone's wordlist collection (not that I'll ever manage to get my hands on it...
I wonder did they use hashcat for the md5($salt.$pass) part?
Posts: 2,936
Threads: 12
Joined: May 2012
09-11-2015, 12:44 AM
(This post was last modified: 09-11-2015, 12:44 AM by epixoip.)
Certainly won't be a replacement for rockyou, rockyou was 32 million. But good stats nonetheless. Will be good to correlate non-uniq between both.
Posts: 30
Threads: 7
Joined: Dec 2012
(09-10-2015, 03:52 PM)rico Wrote: Just spotted this: http://cynosureprime.blogspot.se/2015/09...shley.html
11.2 million passwords recovered so far - would be a nice addition to anyone's wordlist collection (not that I'll ever manage to get my hands on it...
I wonder did they use hashcat for the md5($salt.$pass) part?
We used MDXfind for the first finds. Later, we reformatted the files so we could use oclhashcat as well. We did not use hashcat. oclhashcat cannot find MD5AM2 yet, and appears to have some limits on what we could use for MD5AM .
Validation of bcrypt was a custom program, as nothing existing would be feasible to run.
Posts: 230
Threads: 4
Joined: Aug 2015
That's some fine work, Waffle. Bet it was fun as hell too.
Well done to you all.
Posts: 8
Threads: 1
Joined: Sep 2015
yep ... should see how much is left after cleaning of copy, random & allready known(ex:rockyou)
but nonethless GREAT WORK !