Alright so here's the deal. I got a hash and although I can't seem to find the option to decrypt it on hashcat, I've seen people talk about this hash on this forum and they decrypt it too. so i was wondering if someone could either decrypt it for me and tell me how to do so myself, or just one of the above
thanks guys! heres the hash!:
c4ca207992f72f3eb0bc59429ab0e447:C!AT@
Salted MD5(md5(md5($salt).md5($pass))
(06-29-2012, 09:07 AM)undeath Wrote: [ -> ]vb < 3.8.5
No, IPB, so -m 2811.
However, unless the rules have changed, the initial post should be a ban.
(06-30-2012, 05:28 AM)mastercracker Wrote: [ -> ]However, unless the rules have changed, the initial post should be a ban.
I looked up the hash on google and was unable to find it. Also it looks like this is a self-made hash (cause of the salt/plain). Thats why I did not ban him.
Code:
His algo is: md5(md5(md5($salt).md5($pass))
-m2611, -m2711: md5(md5($salt).md5($pass))
-m2811: md5(md5($pass).$salt)
But, this still can be done if you hash(MD5) your salt.
Look at the code above you will understand.
(06-30-2012, 02:29 PM)M@LIK Wrote: [ -> ]Code:
His algo is: md5(md5(md5($salt).md5($pass))
-m2611, -m2711: md5(md5($salt).md5($pass))
-m2811: md5(md5($pass).$salt)
But, this still can be done if you hash(MD5) your salt.
Look at the code above you will understand.
I think that you have inverted them M@LIK. Just to make sure also that we are talking of the same thing, I am using the OCLhascat-plus modes.
-m 2611 and -m 2711 are for Vbulletin which are md5(md5($pass).$salt).
-m 2811 is for IPB and MyBB which are md5(md5($salt).md5($pass)).
Ahh... Yes, you're right, don't know how I missed that.