Learn about our website mirrors here.
Cracked.TO Database - Leaked, Download! [Exclusive]
by Omnipotent - August 09, 2019 at 05:22 AM
#61
thanks bro for share
plz don't forget https://crack.sx
Reply
#62
(August 13, 2019 at 02:45 AM)Unspoken Wrote:
(August 12, 2019 at 03:31 PM)liff Wrote: In case someone wonders what hashing algo was used:

They just hashed existing MyBB hashes with bcrypt algo. It means that in order to crack hashes you need to generate hash for this algorithm md5(md5($salt).md5($pass)) $salt can be found in column named "salt" and then you just need to use that generated hash as pass candidate for bcrypt.

Thanks to UnPirlaACaso for providing confirmed plaintext

I guess I can be an engineer now Tongue

TL;DR: Algo is bcrypt(md5(md5($salt).md5($pass)))

Let me know if you'd like some help Wink
Are you going to decipher this dump?
Reply
#63
(August 12, 2019 at 10:41 PM)TaganRock1 Wrote:
(August 12, 2019 at 03:31 PM)liff Wrote: In case someone wonders what hashing algo was used:

They just hashed existing MyBB hashes with bcrypt algo. It means that in order to crack hashes you need to generate hash for this algorithm md5(md5($salt).md5($pass)) $salt can be found in column named "salt" and then you just need to use that generated hash as pass candidate for bcrypt.

Thanks to UnPirlaACaso for providing confirmed plaintext

I guess I can be an engineer now Tongue

TL;DR: Algo is bcrypt(md5(md5($salt).md5($pass)))
It will be very difficult to decipher. Almost unreal. And it will take a long time.

They are using DVZ Hash plugin, the database has active sessions and we only need server files. With server files, and within mybb admin panel -> DVZ Hash, there is a button to revert encryption for all users back to MD5
Reply
#64
(August 13, 2019 at 10:52 AM)Coolyou Wrote:
(August 12, 2019 at 10:41 PM)TaganRock1 Wrote:
(August 12, 2019 at 03:31 PM)liff Wrote: In case someone wonders what hashing algo was used:

They just hashed existing MyBB hashes with bcrypt algo. It means that in order to crack hashes you need to generate hash for this algorithm md5(md5($salt).md5($pass)) $salt can be found in column named "salt" and then you just need to use that generated hash as pass candidate for bcrypt.

Thanks to UnPirlaACaso for providing confirmed plaintext

I guess I can be an engineer now Tongue

TL;DR: Algo is bcrypt(md5(md5($salt).md5($pass)))
It will be very difficult to decipher. Almost unreal. And it will take a long time.

They are using DVZ Hash plugin, the database has active sessions and we only need server files. With server files, and within mybb admin panel -> DVZ Hash, there is a button to revert encryption for all users back to MD5
Then appeal to those who hacked: please Do it!
Reply
#65
Thanks for sharing such a huge amount of special data with us!
Reply
#66
holllllllaaaa graciassssssssssssssssssss
Reply
#67
just came from there funny
Reply
#68
Damn bro, full leak. That is impressive
Reply
#69
nice bro! cant wait to check it out
Reply
#70
Sicko mode

Keep up the great work
Reply
#71
Anything Interesting in this database guyse?
Reply
#72
thanks you sir those fuckers dserve this sit hahahah
Reply

Possibly Related Threads…
Thread Author Replies Views Last Post
Morele Database - Leaked, Download! ostrich 220 35,243 2 minutes ago
Last Post: sQQ3
AllWomenStalk Database - Leaked, Download! Spender 32 8,301 1 hour ago
Last Post: Knowledge78671
Houzz Database - Leaked, Download! Vinny Troia 22 2,529 4 hours ago
Last Post: valeos

 Users browsing this thread: 1 Guest(s)