WeHeartIt Database - Leaked, Download! [Exclusive]
by Omnipotent - February 27, 2018 at 06:33 PM
#1
Heart 
Hello RaidForums Community,
Today I have uploaded the We Heart It Database for you to download for free, thanks for reading and enjoy!


[Image: RF_wUzt.png]
|Notes|
In November 2013, the image-based social network We Heart It suffered a data breach. The incident wasn't discovered until October 2017 when 8.6 million user records were brought to We Heart It's attention. The data contained user names, email addresses and password hashes, 80% of which were salted SHA-256 with the remainder being MD5 with no salt. This is an exclusive leak to Raid Forums as this leak has not been surfaced before this date as a publicly downloadable database.

Compromised data: Email addresses, Passwords(MD5/SHA-256), Usernames

ContentsSpoiler
The Database Download below is in the following format INTEGER:USERNAME:EMAIL:HASH keep in mind it is hashed using Salted SHA-256 and a minor number of lines are using MD5. The .7z File's MD5 Hash is 2AFAD3064ECA1E3AD738A1C0E4063B3C

Database Downloads Hidden Content
You must register or login to view this content.

Reply
#2
Very generous of you to share this man, old but golden base!
Reply
#3
thanks for this! Much appreciated
Reply
#4
(February 27, 2018 at 11:53 PM)Rhythm Wrote: Very generous of you to share this man, old but golden base!

oh wow ive never seen demented on the forum :O this is rare
Reply
#5
Any idea what format these SHA-256 ones are in? Would be greatly appreciated!
Reply
#6
(March 01, 2018 at 04:57 PM)tommoboy26 Wrote: Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.
Reply
#7
(March 02, 2018 at 06:33 PM)Omnipotent Wrote:
(March 01, 2018 at 04:57 PM)tommoboy26 Wrote: Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.

Yep but that doesn't necessarily indicate the format for decrypting. Apologies, my fault for not explaining properly.
Reply
#8
(March 02, 2018 at 07:15 PM)tommoboy26 Wrote:
(March 02, 2018 at 06:33 PM)Omnipotent Wrote:
(March 01, 2018 at 04:57 PM)tommoboy26 Wrote: Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.

Yep but that doesn't necessarily indicate the format for decrypting. Apologies, my fault for not explaining properly.

The sha256 hash is in the form of pass:salt. The salt seems to be a 10 character long string of integers, verified on 2 accounts so far.
Reply
#9
(March 03, 2018 at 10:23 PM)bobewell Wrote:
(March 02, 2018 at 07:15 PM)tommoboy26 Wrote:
(March 02, 2018 at 06:33 PM)Omnipotent Wrote:
(March 01, 2018 at 04:57 PM)tommoboy26 Wrote: Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.

Yep but that doesn't necessarily indicate the format for decrypting. Apologies, my fault for not explaining properly.

The sha256 hash is in the form of pass:salt. The salt seems to be a 10 character long string of integers, verified on 2 accounts so far.

Thanks a lot for the info. Are you able to crack these or is this via an external source?
Reply
#10
(March 04, 2018 at 07:37 PM)tommoboy26 Wrote:
(March 03, 2018 at 10:23 PM)bobewell Wrote:
(March 02, 2018 at 07:15 PM)tommoboy26 Wrote:
(March 02, 2018 at 06:33 PM)Omnipotent Wrote:
(March 01, 2018 at 04:57 PM)tommoboy26 Wrote: Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.

Yep but that doesn't necessarily indicate the format for decrypting. Apologies, my fault for not explaining properly.

The sha256 hash is in the form of pass:salt. The salt seems to be a 10 character long string of integers, verified on 2 accounts so far.

Thanks a lot for the info. Are you able to crack these or is this via an external source?

Not from an external source, got it from my own testing. I already knew the password for the two accounts I tried it on, so I ran both the hash and underlying password to find out what the salts were. These hashes are crackable, you'll just have to guess both the password AND the salt, which is why it will take a lot more time vs a simple unsalted hash.
Reply
#11
thanks! been looking for this a while!
Reply
#12
(March 04, 2018 at 11:58 PM)bobewell Wrote: Not from an external source, got it from my own testing. I already knew the password for the two accounts I tried it on, so I ran both the hash and underlying password to find out what the salts were. These hashes are crackable, you'll just have to guess both the password AND the salt, which is why it will take a lot more time vs a simple unsalted hash.

And these integer strings have no obvious relation to the data in the table? Could you PM me an example of a cracked SHA256 hash, and maybe we can figure something out?
Reply

Possibly Related Threads…
Thread Author Replies Views Last Post
Exploit.in Combo List - Leaked, Download! silvernazar 417 97,347 24 minutes ago
Last Post: srgdsthApe
LinkedIn Database - Leaked, Download! Omnipotent 547 99,702 1 hour ago
Last Post: meisborn
Edmodo Database - Leaked, Download! citadel 368 102,630 3 hours ago
Last Post: BalonTheMan

 Users browsing this thread: 3 Guest(s)