Join us on Slack!
Few are those who can see with their own eyes and hear with their own hearts. - Albert Einstein
Sunday, May 26, 2019
Navigation
Home
 Find:
 Information:
Learn
Communicate
Submit
Shop
Challenges
 Exploit:
 Programming:
 Think:
 Track:
 Patch:
 Other:
 Need Help?
Other
Members Online
Total Online: 64
Guests Online: 62
Members Online: 2

Registered Members: 114245
Newest Member: aliadam
Latest Articles
View Thread

HellBound Hackers | Challenges | Realistic

Author

Realistic 1

cioic
Member



Posts: 18
Location: going nuclear before death
Joined: 28.05.17
Rank:
Hacker Level 1
Posted on 03-07-17 01:52
[warning SPOILERS]
solved it but has trouble with the hash. luckily, I decoded it online where they had a database of hashes.

programs I have :

-john
-cain

none of them seemed to give me the results I needed ! What was I doing wrong so I can decrypt it in future ?



Code
john --wordlist=pathtowordlist pathtohashfile




or

Code
john --format=asa-md5 --wordlist=pathtowordlist pathtohashfile




I checked and the password is in my wordlist :|


onclick="destroytheworld()"
index.php
Author

RE: Realistic 1

Huitzilopochtli
Member



Posts: 1614
Location:
Joined: 19.02.13
Rank:
God
Posted on 04-07-17 13:29
john --format=asa-md5

Well for starters, the format 'asa' is usually a prefix for Cisco hashes, and an md5 hash has a 32 char hexadecimal string.
The hash you're trying to decrypt is neither of these two, so you could never crack it with those settings, as it's a mysql hash.
Author

RE: Realistic 1

cioic
Member



Posts: 18
Location: going nuclear before death
Joined: 28.05.17
Rank:
Hacker Level 1
Posted on 06-07-17 00:15
ok, thanks !


onclick="destroytheworld()"
index.php