![]() |
Crack challenge - Printable Version +- Sinisterly (https://sinister.ly) +-- Forum: Hacking (https://sinister.ly/Forum-Hacking) +--- Forum: Network Hacking (https://sinister.ly/Forum-Network-Hacking) +--- Thread: Crack challenge (/Thread-Crack-challenge) |
Crack challenge - Lem0n - 12-24-2013 d0769856f59b45b804f30d55c83d0125f26b3ae5:ethought 3fe2cd78166a0d49b6da0ca934650cee769613c3:coinguy 3317f1237d5b4378471469aa30617b8de66cf7d4 ![]() :a3301bc665a4bbf827dcb51b2dc2a1787aeed125:erundook SMF if you didnt know, good luck RE: Crack challenge - BreShiE - 12-24-2013 Does SMF use salt? Hmm. I might give this a go when. I can be bothered. RE: Crack challenge - Lem0n - 12-24-2013 Algo is sha1(strtolower($username).$pass) salt is the user RE: Crack challenge - w00t - 12-24-2013 It's not really a salt if it's a known string, now is it? RE: Crack challenge - Lem0n - 12-25-2013 (12-24-2013, 06:24 AM)w00t Wrote: It's not really a salt if it's a known string, now is it? lol... no worries i went to isp, they're more "familar" with SMF hashes |