
Hello RaidForums Community,
Today I have uploaded the gPotato Database for you to download for free, thanks for reading and enjoy!
|Notes|
In July 2007, the multiplayer game portal known as gPotato (link to archive of the site at that time) suffered a data breach and over 2 million user accounts were exposed. The site later merged into the Webzen portal where the original accounts still exist today. The exposed data included usernames, email and IP addresses, MD5 hashes and personal attributes such as gender, birth date, physical address and security questions and answers stored in plain text.
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names, Physical addresses, Security questions and answers, Usernames, Website activity, Passwords (Salted MD5, Static salt is kikugalanet)
Today I have uploaded the gPotato Database for you to download for free, thanks for reading and enjoy!
|Notes|
In July 2007, the multiplayer game portal known as gPotato (link to archive of the site at that time) suffered a data breach and over 2 million user accounts were exposed. The site later merged into the Webzen portal where the original accounts still exist today. The exposed data included usernames, email and IP addresses, MD5 hashes and personal attributes such as gender, birth date, physical address and security questions and answers stored in plain text.
Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names, Physical addresses, Security questions and answers, Usernames, Website activity, Passwords (Salted MD5, Static salt is kikugalanet)
ContentsSpoiler
Keep in mind this breach's password hashing algorithm is salted MD5 they use a Static salt on their passwords which is kikugalanet. The .7z File's MD5 Hash is BA5FFEC805A163FDB4F22139A6B6EBB7. Total record count of 2142547.
Decryption using Hashcat
Decryption using Hashcat
cat gpotato.txt | cut -d: -f3 | sort | uniq | sed -E 's/([a-f0-9]{32})/\1:kikugalanet/g' > left.md5 # [uniq 1258855]
./hashcat64.bin -a 0 -m 20 --outfile found.md5 --outfile-format 3 --remove left.md5 wordlist