25 Hashes or Less Requests (Other)

medina12

Active member
Joined
Dec 30, 2019
Messages
200
Reaction score
0
Credits
0
hello!

I hope it is ok to post here since general hash requests forum seems to be locked now.

Any help with the two office hashes below is highly appreciated.

$office$*2013*100000*256*16*c36a2879e2140c547fc0961ef4f3071c*00c6e0866e1833ebf900f393ba5f8f9e*fb055a018ceb4a48fa678eca4fde42a4b6ae106edd317a2af046ba248d00aa03
$office$*2010*100000*128*16*7d2c191760567af7be7e1cf975d9faec*457290e8b53649ad166f985f9fd72722*7f968f96bcdeee432896e86f30ed876d69bfb100be92c8fc41a1174f138cac2b
 

Roblestion

Active member
Cracker
Joined
Dec 30, 2019
Messages
644
Reaction score
0
Credits
29
I’m having a really hard time getting the hash below decrypted expecially since I’m a total noob.

The first one is a bcrypt i believe:
$2a$08$u6IVXhicJsIrizTD.SeII.P7nx3bCF7Ah9VBEOPeKhmyT64jALnBm

Thank you in advance for your help!!!
 

embora

Active member
Joined
Dec 30, 2019
Messages
96
Reaction score
0
Credits
0
bcrypt

$2y$10$88B1mkCHba0.TaOaU7XWVu8TtMNxEbV6xbvVxCUpmCgQBsTR7gs6q
$2y$10$fElhe7yviFZl4t7dh5mVHevA/HgdU.y4HhFlQNpPOdDzhNwabzbny
$2y$10$ziW30meellGsabMdPaiTiee3qyj0HLIdW6wihhgCK277VYBoGn/xG
$2y$10$0jB2yIuUJN5RK4W6yVR0WuvsalSLsYiBp8abvxYjAt9WzOFToj5Za
$2y$10$BRz3rrB5uwErTaVbg8dzVOmJtMktCgiZSeT6vSu.3MswJeeNoiw2i
$2y$10$zm/ujoYcesjJc52BhXDir.MQVuf5biMEmfn6xkXoiUynQQieNEYDC
$2y$10$Rc.5yKjt2zDzj.wgKc/t5ON31nLEOTJdxIy0AYQMln0uHU8tk3GQy


thanks!!
 

thichditgai13

Active member
Joined
Dec 30, 2019
Messages
48
Reaction score
0
Credits
0
6617f6eecd7410e6745de1b564303381150cb646:32338aebf
6f0c7222e7dbf41d92f8ec3671fd3c9d8226ef80:49af32539


thank in advance
 

BooBear3

Active member
Joined
Dec 30, 2019
Messages
417
Reaction score
0
Credits
0
bcrypt. +10 rep for any help.

$826y4$31226$dMbj2Yf0eN3GbYe54Y0jcAc12Z4T1h8k7Y7jfZ6iaN2ec09T0Ob2yMp6BjvZ8YqLE0e7fGkhRNyw726:c1496e3959af0d9d4123d0131fb8820e
$826y4$31226$dZbD2If3eN3Dbdem4O0GcEcx2N4W1U827N7jfJ6laM2uco9W0Cbq2iqydNu3yfVqnfiryx00DsfEsVe:3ddd8666ca1cf6425fbdf6ca5590a922
 

Roblestion

Active member
Cracker
Joined
Dec 30, 2019
Messages
644
Reaction score
0
Credits
29
Hello I’d really appreciate help with the bcryp below. I’ve seperated what I believe is the salt:

$826y4$31226$dZbW2RfmeZ3jbQe04M0DcRcj2Z4j1I8x7Z7DfE6xaM2Oce9w0VbL0jKCrKlAMvbpE2r7qgom5caRyBG:c8ea35a1268d0df5b62b290d2b1f5a4b

Hash: $826y4$31226$dZbW2RfmeZ3jbQe04M0DcRcj2Z4j1I8x7Z7DfE6xaM2Oce9w0VbL0jKCrKlAMvbpE2r7qgom5caRyBG
Salt: c8ea35a1268d0df5b62b290d2b1f5a4b

From Edmodo. Thank you in advance!
 

Psrporcayyx

Active member
Joined
Dec 30, 2019
Messages
38
Reaction score
0
Credits
0
For Edmodo, DB Hashs are obviously ofuscated, so, first you have to un-obfuscate it.
It's pretty easy, they just added a string in the initial Hash (This string is: 864326db2fe3be40cc241877f6a2c90b)
For exemple,

$826y4$31226$dNbT2Mf1eO3DbNel4M0DcMc42Z4j1Y837Y7TfI6xaY2ecP9L0ibwcIm350DpuPINWA9pRwHqL8p9pwK
-8-6-4-3-2-6-d-b-2-f-e-3-b-e-4-0-c-c-2-4-1-8-7-7-f-6-a-2-c-9-0-b

Real BCrypt Hash : $2y$12$NTM1ODNlMDM4ZjY3YTIxYePLiwcIm350DpuPINWA9pRwHqL8p9pwK

So, for your hash,

$826y4$31226$dZbW2RfmeZ3jbQe04M0DcRcj2Z4j1I8x7Z7DfE6xaM2Oce9w0VbL0jKCrKlAMvbpE2r7qgom5caRyBG
-8-6-4-3-2-6-d-b-2-f-e-3-b-e-4-0-c-c-2-4-1-8-7-7-f-6-a-2-c-9-0-b
Real BCrypt Hash : $2y$12$ZWRmZjQ0MDRjZjIxZDExMOewVL0jKCrKlAMvbpE2r7qgom5caRyBG

But it is not finished, this is not only bcrypt.
They first Hash password with MD5, and hash the result with BCrypt, so if you can break BCrypt hash, you'll first get MD5 Hash of the password.

Personaly, i can't go further, my hardware is not powerful enough to break bcrypt(md5(£pass))

But if someone can, here are a BCrypt hash i want to crack :c (I can give ZKM Obj Lisences, or other stuff like that)

$2y$12$ZjQ2OTYxM2Q0MTcwNDI5YOwlJCrrXRjeT7MBjCYJh9VJEpTPbAvmy

Thank you, and have a nice day :)
 

Roblestion

Active member
Cracker
Joined
Dec 30, 2019
Messages
644
Reaction score
0
Credits
29
Thank you @Psrporcayyx. That was very helpful. Would you be able to assist in cracking the bcrypt below? It’s not as complex as Edmodo haha

$2a$08$u6IVXhicJsIrizTD.SeII.P7nx3bCF7Ah9VBEOPeKhmyT64jALnBmH
 

ross

Member
Joined
Dec 30, 2019
Messages
6
Reaction score
0
Credits
0
I have no idea what this hash is.. Also I don't know if my first post should be a request to dehash something xD. Sorry if that's a nono.

If you could attempt to dehash this that would be great!

$2a$10$5jjVoAa8CBw5Vzf9lWJ4.u5aq.daLrMHagOcznV/D8nNsaaeLnnIe
 

flaks

Active member
Cracker
Joined
Dec 30, 2019
Messages
1,092
Reaction score
0
Credits
122
$2y$09$kdSFagFwoaYOpim6lpId2uWi8qt7XbnrDIm5Eu6S32vQrhB5w4x0.
$2y$09$5nsmmd4smRx5rKpqwfBSzuEo7Ns95.TiLncf8ffEDPF59ikHjNgdK
 

mw4re

Active member
Joined
Dec 30, 2019
Messages
437
Reaction score
0
Credits
236
Hashes have been removed by freeroute.
Reason: Post your hashes to the correct thread, please.

CMS HashesAssistance with password recovery for CMS hashes: Joomla, e107, Wordpress, osCommerce


please help to crack
 

Psrporcayyx

Active member
Joined
Dec 30, 2019
Messages
38
Reaction score
0
Credits
0
Roblestion said:
Thank you @psrporcayyx. That was very helpful. Would you be able to assist in cracking the bcrypt below? It’s not as complex as Edmodo haha

$2a$08$u6IVXhicJsIrizTD.SeII.P7nx3bCF7Ah9VBEOPeKhmyT64jALnBmH
No problem :)
Unfortunalty, BCrypt is to slow for me, my lapotop is not a Brute Force Machine. It takes me 400ms to test only one password :c
But try to create or dl a dictionary and launch hashcat to see how long it takes for you :)
 
D

Deleted member

Guest
Psrporcayyx said:
For Edmodo, DB Hashs are obviously ofuscated, so, first you have to un-obfuscate it.
It's pretty easy, they just added a string in the initial Hash (This string is: 864326db2fe3be40cc241877f6a2c90b)
For exemple,

$826y4$31226$dNbT2Mf1eO3DbNel4M0DcMc42Z4j1Y837Y7TfI6xaY2ecP9L0ibwcIm350DpuPINWA9pRwHqL8p9pwK
-8-6-4-3-2-6-d-b-2-f-e-3-b-e-4-0-c-c-2-4-1-8-7-7-f-6-a-2-c-9-0-b

Real BCrypt Hash : $2y$12$NTM1ODNlMDM4ZjY3YTIxYePLiwcIm350DpuPINWA9pRwHqL8p9pwK

So, for your hash,

$826y4$31226$dZbW2RfmeZ3jbQe04M0DcRcj2Z4j1I8x7Z7DfE6xaM2Oce9w0VbL0jKCrKlAMvbpE2r7qgom5caRyBG
-8-6-4-3-2-6-d-b-2-f-e-3-b-e-4-0-c-c-2-4-1-8-7-7-f-6-a-2-c-9-0-b
Real BCrypt Hash : $2y$12$ZWRmZjQ0MDRjZjIxZDExMOewVL0jKCrKlAMvbpE2r7qgom5caRyBG

But it is not finished, this is not only bcrypt.
They first Hash password with MD5, and hash the result with BCrypt, so if you can break BCrypt hash, you'll first get MD5 Hash of the password.

Personaly, i can't go further, my hardware is not powerful enough to break bcrypt(md5(£pass))

But if someone can, here are a BCrypt hash i want to crack :c (I can give ZKM Obj Lisences, or other stuff like that)

$2y$12$ZjQ2OTYxM2Q0MTcwNDI5YOwlJCrrXRjeT7MBjCYJh9VJEpTPbAvmy

Thank you, and have a nice day :)
Quick way to de-obfuscate these hashes...

Code:
echo -n '$826y4$31226$dZbW2RfmeZ3jbQe04M0DcRcj2Z4j1I8x7Z7DfE6xaM2Oce9w0VbL0jKCrKlAMvbpE2r7qgom5caRyBG' | cut -c `seq -s "," 1 2 64`,65-
or feed a list of them,
Code:
cut -c `seq -s "," 1 2 64`,65- obfuscated.txt > de-obfuscated.txt
 

freeroute

Community Manager
Staff member
Community Manager
Super Moderator
Joined
Dec 30, 2019
Messages
20,567
Reaction score
1,038
Credits
5,343
:)
I use the same commands, also....
For mass edmodo hashes I put it in a bash-script. So it can handle more edmodo-hashes.
 

LordZilla

Active member
Joined
Dec 30, 2019
Messages
102
Reaction score
0
Credits
0
Hash has been removed by freeroute.
Reason: Incorrect thread.

wp hash crack
 
Top