Hash Descomplica Db(5.3M) stackero User User ID 19655 Jul 1, 2023 23 229 #CR 48 Jul 28, 2023 Thread starter Thread Author #1 Country: Brazil Year: 2021 Domain: Descomplica.com.br Lines: 5.3M Email addresses, Names, Passwords, Purchases
Country: Brazil Year: 2021 Domain: Descomplica.com.br Lines: 5.3M Email addresses, Names, Passwords, Purchases
kapiushon User User ID 21830 Jul 26, 2023 4 13 #CR 1 Jul 28, 2023 #2 niiiice, do u have any info in what hash type these are?
stackero User User ID 19655 Jul 1, 2023 23 229 #CR 48 Jul 29, 2023 Thread starter Thread Author #3 niiiice, do u have any info in what hash type these are? Click to expand... i think PBKDF2-HMAC-SHA1 but they have to be formatted properly first and i forgot how to do that
niiiice, do u have any info in what hash type these are? Click to expand... i think PBKDF2-HMAC-SHA1 but they have to be formatted properly first and i forgot how to do that
krysto User User ID 24715 Aug 14, 2023 6 1 #CR 2 Aug 14, 2023 #6 Does the db also contain emails addresses?
krysto User User ID 24715 Aug 14, 2023 6 1 #CR 2 Aug 15, 2023 #8 Hi, do you have any information on the hash used for the passwords, can't seem to identify the hash used
Hi, do you have any information on the hash used for the passwords, can't seem to identify the hash used
krysto User User ID 24715 Aug 14, 2023 6 1 #CR 2 Aug 28, 2023 #9 For those interested, the format to crack the hashes (PBKDF2-HMAC-SHA1) is: sha1:[iteration count]:[salt in base64]:[digest in base64] All we are given is the digest, so we are missing the salt and the iteration count. Once we have that the hash can be cracked using: hashcat -m 12000 -a 0 -w 3 hash.txt dict.txt Where hash.txt contains the hash in the format sha1:[iteration count]:[salt in base64]:[digest in base64] If anyone has any idea about the salt and/or the iteration count that would be very helpful!
For those interested, the format to crack the hashes (PBKDF2-HMAC-SHA1) is: sha1:[iteration count]:[salt in base64]:[digest in base64] All we are given is the digest, so we are missing the salt and the iteration count. Once we have that the hash can be cracked using: hashcat -m 12000 -a 0 -w 3 hash.txt dict.txt Where hash.txt contains the hash in the format sha1:[iteration count]:[salt in base64]:[digest in base64] If anyone has any idea about the salt and/or the iteration count that would be very helpful!
afrimonin User User ID 65824 May 22, 2024 9 4 Moldova #CR 40 Jul 4, 2024 #10 stackero said: Country: Brazil Year: 2021 Domain: Descomplica.com.br Lines: 5.3M Email addresses, Names, Passwords, Purchases -=Stripped Content=- Click to expand... still working?
stackero said: Country: Brazil Year: 2021 Domain: Descomplica.com.br Lines: 5.3M Email addresses, Names, Passwords, Purchases -=Stripped Content=- Click to expand... still working?