Thread Rating:
  • 4 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
WeHeartIt Database - Leaked, Download! [Exclusive]
#1
Heart 
Hello RaidForums Community,
Today I have uploaded the We Heart It Database for you to download for free, thanks for reading and enjoy!


[Image: RF_wUzt.png]
|Notes|
In November 2013, the image-based social network We Heart It suffered a data breach. The incident wasn't discovered until October 2017 when 8.6 million user records were brought to We Heart It's attention. The data contained user names, email addresses and password hashes, 80% of which were salted SHA-256 with the remainder being MD5 with no salt. This is an exclusive leak to Raid Forums as this leak has not been surfaced before this date as a publicly downloadable database.

Compromised data: Email addresses, Passwords(MD5/SHA-256), Usernames

Show ContentContents:

Database Downloads:
You must register or login to view this content.

Reply
#2
Very generous of you to share this man, old but golden base!
Reply
#3
thanks for this! Much appreciated
Reply
#4
(02-27-2018, 11:53 PM)Rhythm Wrote:  Very generous of you to share this man, old but golden base!

oh wow ive never seen demented on the forum :O this is rare
Reply
#5
Any idea what format these SHA-256 ones are in? Would be greatly appreciated!
Reply
#6
(03-01-2018, 04:57 PM)tommoboy26 Wrote:  Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.
Reply
#7
(03-02-2018, 06:33 PM)Omnipotent Wrote:  
(03-01-2018, 04:57 PM)tommoboy26 Wrote:  Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.

Yep but that doesn't necessarily indicate the format for decrypting. Apologies, my fault for not explaining properly.
Reply
#8
(03-02-2018, 07:15 PM)tommoboy26 Wrote:  
(03-02-2018, 06:33 PM)Omnipotent Wrote:  
(03-01-2018, 04:57 PM)tommoboy26 Wrote:  Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.

Yep but that doesn't necessarily indicate the format for decrypting. Apologies, my fault for not explaining properly.

The sha256 hash is in the form of pass:salt. The salt seems to be a 10 character long string of integers, verified on 2 accounts so far.
Reply
#9
(03-03-2018, 10:23 PM)bobewell Wrote:  
(03-02-2018, 07:15 PM)tommoboy26 Wrote:  
(03-02-2018, 06:33 PM)Omnipotent Wrote:  
(03-01-2018, 04:57 PM)tommoboy26 Wrote:  Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.

Yep but that doesn't necessarily indicate the format for decrypting. Apologies, my fault for not explaining properly.

The sha256 hash is in the form of pass:salt. The salt seems to be a 10 character long string of integers, verified on 2 accounts so far.

Thanks a lot for the info. Are you able to crack these or is this via an external source?
Reply
#10
(03-04-2018, 07:37 PM)tommoboy26 Wrote:  
(03-03-2018, 10:23 PM)bobewell Wrote:  
(03-02-2018, 07:15 PM)tommoboy26 Wrote:  
(03-02-2018, 06:33 PM)Omnipotent Wrote:  
(03-01-2018, 04:57 PM)tommoboy26 Wrote:  Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.

Yep but that doesn't necessarily indicate the format for decrypting. Apologies, my fault for not explaining properly.

The sha256 hash is in the form of pass:salt. The salt seems to be a 10 character long string of integers, verified on 2 accounts so far.

Thanks a lot for the info. Are you able to crack these or is this via an external source?

Not from an external source, got it from my own testing. I already knew the password for the two accounts I tried it on, so I ran both the hash and underlying password to find out what the salts were. These hashes are crackable, you'll just have to guess both the password AND the salt, which is why it will take a lot more time vs a simple unsalted hash.
Reply
#11
thanks! been looking for this a while!
Reply
#12
(03-04-2018, 11:58 PM)bobewell Wrote:  Not from an external source, got it from my own testing. I already knew the password for the two accounts I tried it on, so I ran both the hash and underlying password to find out what the salts were. These hashes are crackable, you'll just have to guess both the password AND the salt, which is why it will take a lot more time vs a simple unsalted hash.

And these integer strings have no obvious relation to the data in the table? Could you PM me an example of a cracked SHA256 hash, and maybe we can figure something out?
Reply
 


Possibly Related Threads...
Thread Author Replies Views Last Post
Star DaFont Database - Leaked, Download! penterest 61 9,005 56 minutes ago
Last Post: JuhoBaabeli
Exclamation 000Webhost Database - Leaked, Download! Loki 182 26,817 1 hour ago
Last Post: JuhoBaabeli
Shocked Xat Database - Leaked, Download! Omnipotent 64 12,657 1 hour ago
Last Post: JuhoBaabeli
Thumbsup Tumblr Database - Leaked, Download! Omnipotent 289 44,683 3 hours ago
Last Post: Retribution
Thumbsup Apple Database - Leaked, Download! Omnipotent 131 15,697 4 hours ago
Last Post: whatis



Users browsing this thread: 1 Guest(s)