Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


[HC Official] T0rn - Hash Cracker V.2 filter_list
Author
Message
RE: [HC Official] T0rn - Hash Cracker V.2 #7
(03-15-2014, 01:34 PM)shp0ngl3 Wrote: Nice little tool you got there Smile

Here comes a little suggestion Smile

What database are you using? Does it have hashing functions? If so, then I suggest you add plaintext word as well in its own table to use to look for other combinations than just md5().

This way you can make things more dynamic and easier to add application specific hashing approaches also with salts

Example:
Let's say an application uses md5(md5(salt).password)

In the query you could call something like this (using MySQL for the example)
Code:
SELECT password FROM hashes WHERE MD5(CONCAT(MD5(<salt>),password)) = '<the-hash-provided-by-the-user>'

Salt: shp0ngl3
Hash: 95fc517d1c6a88b3da8a46f35c06f48b
Code:
SELECT password FROM hashes WHERE MD5(CONCAT(MD5('shp0ngl3'),password)) = '95fc517d1c6a88b3da8a46f35c06f48b';

This will return that the plain text password is admin

The method used here is slower than just searching for hashes, but this way you don't need the unique hash for every different salting and hashing combination Smile

Just a suggestion if it's possible Smile

I am using 2 text files, One for hashes and other for the passwords. I'm sorry if I made wrong use of the word "Database" Tongue

EDIT: Well I found your suggestion to be pretty useful, TY Biggrin
My Blog: http://www.procurity.wordpress.com
Donations: 1HLjiSbnWMpeQU46eUVCrYdbkrtduX7snG

Reply





Messages In This Thread
[HC Official] T0rn - Hash Cracker V.2 - by Ex094 - 03-15-2014, 06:58 AM



Users browsing this thread: 1 Guest(s)