Thread Rating:
  • 4 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
WeHeartIt Database - Leaked, Download! [Exclusive]
#1
Heart 
Hello RaidForums Community,
Today I have uploaded the We Heart It Database for you to download for free, thanks for reading and enjoy!


[Image: RF_wUzt.png]
|Notes|
In November 2013, the image-based social network We Heart It suffered a data breach. The incident wasn't discovered until October 2017 when 8.6 million user records were brought to We Heart It's attention. The data contained user names, email addresses and password hashes, 80% of which were salted SHA-256 with the remainder being MD5 with no salt. This is an exclusive leak to Raid Forums as this leak has not been surfaced before this date as a publicly downloadable database.

Compromised data: Email addresses, Passwords(MD5/SHA-256), Usernames

Show ContentContents:

Database Downloads:
You must register or login to view this content.

Reply
#2
Very generous of you to share this man, old but golden base!
Reply
#3
thanks for this! Much appreciated
Reply
#4
(02-27-2018, 11:53 PM)Rhythm Wrote:  Very generous of you to share this man, old but golden base!

oh wow ive never seen demented on the forum :O this is rare
Reply
#5
Any idea what format these SHA-256 ones are in? Would be greatly appreciated!
Reply
#6
(03-01-2018, 04:57 PM)tommoboy26 Wrote:  Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.
Reply
#7
(03-02-2018, 06:33 PM)Omnipotent Wrote:  
(03-01-2018, 04:57 PM)tommoboy26 Wrote:  Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.

Yep but that doesn't necessarily indicate the format for decrypting. Apologies, my fault for not explaining properly.
Reply
#8
(03-02-2018, 07:15 PM)tommoboy26 Wrote:  
(03-02-2018, 06:33 PM)Omnipotent Wrote:  
(03-01-2018, 04:57 PM)tommoboy26 Wrote:  Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.

Yep but that doesn't necessarily indicate the format for decrypting. Apologies, my fault for not explaining properly.

The sha256 hash is in the form of pass:salt. The salt seems to be a 10 character long string of integers, verified on 2 accounts so far.
Reply
#9
(03-03-2018, 10:23 PM)bobewell Wrote:  
(03-02-2018, 07:15 PM)tommoboy26 Wrote:  
(03-02-2018, 06:33 PM)Omnipotent Wrote:  
(03-01-2018, 04:57 PM)tommoboy26 Wrote:  Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.

Yep but that doesn't necessarily indicate the format for decrypting. Apologies, my fault for not explaining properly.

The sha256 hash is in the form of pass:salt. The salt seems to be a 10 character long string of integers, verified on 2 accounts so far.

Thanks a lot for the info. Are you able to crack these or is this via an external source?
Reply
#10
(03-04-2018, 07:37 PM)tommoboy26 Wrote:  
(03-03-2018, 10:23 PM)bobewell Wrote:  
(03-02-2018, 07:15 PM)tommoboy26 Wrote:  
(03-02-2018, 06:33 PM)Omnipotent Wrote:  
(03-01-2018, 04:57 PM)tommoboy26 Wrote:  Any idea what format these SHA-256 ones are in? Would be greatly appreciated!

Clearly says these are salted SHA-256 hashes.

Yep but that doesn't necessarily indicate the format for decrypting. Apologies, my fault for not explaining properly.

The sha256 hash is in the form of pass:salt. The salt seems to be a 10 character long string of integers, verified on 2 accounts so far.

Thanks a lot for the info. Are you able to crack these or is this via an external source?

Not from an external source, got it from my own testing. I already knew the password for the two accounts I tried it on, so I ran both the hash and underlying password to find out what the salts were. These hashes are crackable, you'll just have to guess both the password AND the salt, which is why it will take a lot more time vs a simple unsalted hash.
Reply
#11
thanks! been looking for this a while!
Reply
#12
(03-04-2018, 11:58 PM)bobewell Wrote:  Not from an external source, got it from my own testing. I already knew the password for the two accounts I tried it on, so I ran both the hash and underlying password to find out what the salts were. These hashes are crackable, you'll just have to guess both the password AND the salt, which is why it will take a lot more time vs a simple unsalted hash.

And these integer strings have no obvious relation to the data in the table? Could you PM me an example of a cracked SHA256 hash, and maybe we can figure something out?
Reply
 


Possibly Related Threads...
Thread Author Replies Views Last Post
Star LinkedIn Database - Leaked, Download! Omnipotent 411 64,484 1 hour ago
Last Post: mdxdegrees
Star Badoo Database - Leaked, Download! Omnipotent 181 33,170 2 hours ago
Last Post: warrior04
Rainbow Exploit.in Combo List - Leaked, Download! silvernazar 340 71,358 3 hours ago
Last Post: polskamma
Thumbsup Turkish Citizenship Database - Leaked, Download! Omnipotent 71 14,125 5 hours ago
Last Post: digitulip
Exclamation xSplit Database - Leaked, Download! Loki 65 22,189 6 hours ago
Last Post: cbalah



Users browsing this thread: 1 Guest(s)