<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[PwnForums - Hash Cracking]]></title>
		<link>https://pwnforums.st/</link>
		<description><![CDATA[PwnForums - https://pwnforums.st]]></description>
		<pubDate>Sat, 04 Apr 2026 21:20:27 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Dictionary attack on bcrypt]]></title>
			<link>https://pwnforums.st/Thread-Dictionary-attack-on-bcrypt</link>
			<pubDate>Sun, 08 Feb 2026 21:31:37 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=705245">Ting7</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Dictionary-attack-on-bcrypt</guid>
			<description><![CDATA[I’ve noticed that the percentage of recovered passwords from bcrypt hashes can vary quite a bit between dbs.<br />
What causes such big differences and how are dictionary attacks even practical when you’re dealing with millions of bcrypt hashes?]]></description>
			<content:encoded><![CDATA[I’ve noticed that the percentage of recovered passwords from bcrypt hashes can vary quite a bit between dbs.<br />
What causes such big differences and how are dictionary attacks even practical when you’re dealing with millions of bcrypt hashes?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Help me decrypt the md5 hash please]]></title>
			<link>https://pwnforums.st/Thread-Help-me-decrypt-the-md5-hash-please</link>
			<pubDate>Sat, 02 Aug 2025 08:15:23 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=472793">NgoThuan</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Help-me-decrypt-the-md5-hash-please</guid>
			<description><![CDATA[(md5(md5(md5(md5(&#36;password)))) === "f116c4d27eafeebbcce7534e23e3cdab9") <br />
<br />
The password :  f116c4d27eafeebbcce7534e23e3cdab9 .<br />
<br />
THANK FOR HELP ME  <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fheart.png" alt="Heart" title="Heart" class="smilie smilie_16" /> <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fheart.png" alt="Heart" title="Heart" class="smilie smilie_16" />]]></description>
			<content:encoded><![CDATA[(md5(md5(md5(md5(&#36;password)))) === "f116c4d27eafeebbcce7534e23e3cdab9") <br />
<br />
The password :  f116c4d27eafeebbcce7534e23e3cdab9 .<br />
<br />
THANK FOR HELP ME  <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fheart.png" alt="Heart" title="Heart" class="smilie smilie_16" /> <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fheart.png" alt="Heart" title="Heart" class="smilie smilie_16" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Hash cracking for beginners]]></title>
			<link>https://pwnforums.st/Thread-Hash-cracking-for-beginners</link>
			<pubDate>Wed, 26 Mar 2025 17:56:14 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=442363">legalethicalhacker</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Hash-cracking-for-beginners</guid>
			<description><![CDATA[Prerequisites: knowing what a hash is<br />
<br />
Once you have a password hash you can either manually use <span style="font-weight: bold;" class="mycode_b">hashcat</span>, <span style="font-weight: bold;" class="mycode_b">johntheripper</span> or other tools to crack it. or you can go the easier route and use tools like:<br />
<br />
<span style="font-weight: bold;" class="mycode_b">crackstation[.]net</span><br />
<span style="font-weight: bold;" class="mycode_b">hashes[.]com</span><br />
<span style="font-weight: bold;" class="mycode_b">md5decrypt[.]net</span><br />
<span style="font-weight: bold;" class="mycode_b">hashkiller[.]co[.]uk</span><br />
<span style="font-weight: bold;" class="mycode_b">ntlm[.]pw</span><br />
<br />
To crack a hash with hashcat:<br />
<br />
install 'hashcat' package with ur package manager<br />
<br />
<span style="font-weight: bold;" class="mycode_b">hashcat --identify hash.txt</span><br />
To see which hashing algorithm it is (md5,sha256)<br />
if you still dont know, you can use tools like<br />
<span style="font-weight: bold;" class="mycode_b">hashid</span> or <span style="font-weight: bold;" class="mycode_b">hash-identifier</span> or<br />
visit <span style="font-weight: bold;" class="mycode_b">hashcat[.]net/wiki/doku.phpid=example_hashes</span><br />
<br />
after you found the hash, this should work:<br />
<span style="font-weight: bold;" class="mycode_b">hashcat --help | grep -E "^\s*[0-9]+"</span><br />
<br />
then run:<br />
<span style="font-weight: bold;" class="mycode_b">hashcat -m (the number to ur hash type) hash.txt wordlist.txt</span><br />
<br />
To crack a hash with johntheripper:<br />
<br />
install 'john' package with ur package manager<br />
<br />
identify the hash with the tools listed above<br />
<br />
and run:<br />
<span style="font-weight: bold;" class="mycode_b">john --format=yourhashtype --wordlist=wordlist.txt hash.txt</span><br />
<br />
you can also just run <span style="font-weight: bold;" class="mycode_b">john hash.txt</span>, but it might fail guessing the hash type, and the default wordlist is pretty weak.<br />
<br />
i recommend using the online tools listed above, as they are very fast and have huge wordlists, i also recommend to use hashcat instead of john because it is faster.]]></description>
			<content:encoded><![CDATA[Prerequisites: knowing what a hash is<br />
<br />
Once you have a password hash you can either manually use <span style="font-weight: bold;" class="mycode_b">hashcat</span>, <span style="font-weight: bold;" class="mycode_b">johntheripper</span> or other tools to crack it. or you can go the easier route and use tools like:<br />
<br />
<span style="font-weight: bold;" class="mycode_b">crackstation[.]net</span><br />
<span style="font-weight: bold;" class="mycode_b">hashes[.]com</span><br />
<span style="font-weight: bold;" class="mycode_b">md5decrypt[.]net</span><br />
<span style="font-weight: bold;" class="mycode_b">hashkiller[.]co[.]uk</span><br />
<span style="font-weight: bold;" class="mycode_b">ntlm[.]pw</span><br />
<br />
To crack a hash with hashcat:<br />
<br />
install 'hashcat' package with ur package manager<br />
<br />
<span style="font-weight: bold;" class="mycode_b">hashcat --identify hash.txt</span><br />
To see which hashing algorithm it is (md5,sha256)<br />
if you still dont know, you can use tools like<br />
<span style="font-weight: bold;" class="mycode_b">hashid</span> or <span style="font-weight: bold;" class="mycode_b">hash-identifier</span> or<br />
visit <span style="font-weight: bold;" class="mycode_b">hashcat[.]net/wiki/doku.phpid=example_hashes</span><br />
<br />
after you found the hash, this should work:<br />
<span style="font-weight: bold;" class="mycode_b">hashcat --help | grep -E "^\s*[0-9]+"</span><br />
<br />
then run:<br />
<span style="font-weight: bold;" class="mycode_b">hashcat -m (the number to ur hash type) hash.txt wordlist.txt</span><br />
<br />
To crack a hash with johntheripper:<br />
<br />
install 'john' package with ur package manager<br />
<br />
identify the hash with the tools listed above<br />
<br />
and run:<br />
<span style="font-weight: bold;" class="mycode_b">john --format=yourhashtype --wordlist=wordlist.txt hash.txt</span><br />
<br />
you can also just run <span style="font-weight: bold;" class="mycode_b">john hash.txt</span>, but it might fail guessing the hash type, and the default wordlist is pretty weak.<br />
<br />
i recommend using the online tools listed above, as they are very fast and have huge wordlists, i also recommend to use hashcat instead of john because it is faster.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Need help to crack a password protected zip file]]></title>
			<link>https://pwnforums.st/Thread-Need-help-to-crack-a-password-protected-zip-file</link>
			<pubDate>Sun, 23 Feb 2025 20:27:51 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=3137">InsertEnd</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Need-help-to-crack-a-password-protected-zip-file</guid>
			<description><![CDATA[I have a password protected zip archive that contains 2 files, a.txt (4GB/60GB) and b.txt (2KB/4KB) (compressed/uncompressed)<br />
<br />
I can see the files name, but not the content.<br />
<br />
I have a copy of b.txt uncompressed and decrypted from when I knew the password<br />
<br />
What approaches do you recommend?<br />
<br />
For now, I'm trying to find out how to use hashcat, I was able to crack some test files.<br />
<br />
thanks in advance <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fbiggrin.png" alt="Big Grin" title="Big Grin" class="smilie smilie_4" />]]></description>
			<content:encoded><![CDATA[I have a password protected zip archive that contains 2 files, a.txt (4GB/60GB) and b.txt (2KB/4KB) (compressed/uncompressed)<br />
<br />
I can see the files name, but not the content.<br />
<br />
I have a copy of b.txt uncompressed and decrypted from when I knew the password<br />
<br />
What approaches do you recommend?<br />
<br />
For now, I'm trying to find out how to use hashcat, I was able to crack some test files.<br />
<br />
thanks in advance <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fbiggrin.png" alt="Big Grin" title="Big Grin" class="smilie smilie_4" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Nvidia 5090]]></title>
			<link>https://pwnforums.st/Thread-Nvidia-5090</link>
			<pubDate>Fri, 31 Jan 2025 12:36:23 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=3907">joepa</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Nvidia-5090</guid>
			<description><![CDATA[Who's got one?<br />
Is it any good for hashcat?<br />
Of just extra AI frames and no additional performance over a 4090?]]></description>
			<content:encoded><![CDATA[Who's got one?<br />
Is it any good for hashcat?<br />
Of just extra AI frames and no additional performance over a 4090?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[I really need help for solve these bcrypt]]></title>
			<link>https://pwnforums.st/Thread-I-really-need-help-for-solve-these-bcrypt</link>
			<pubDate>Fri, 31 Jan 2025 01:22:03 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=391323">mcdodo</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-I-really-need-help-for-solve-these-bcrypt</guid>
			<description><![CDATA[3200 bcrypt &#36;2*&#36;, Blowfish (Unix)<br />
<br />
&#36;2y&#36;10&#36;niHcfy6W52pSll8pWm58pejS40sQECuELfQo1AQ/TfPf4Vjk.OBqi<br />
&#36;2y&#36;10&#36;mTpvv9zePFetR.Q7A/lPVupHJsb2AtzIidT2neMPlyno3x/hHDZ/C<br />
&#36;2y&#36;10&#36;onqQYKfeNlrVunNgUP0q1.xyqATCxW5ToVaHKaRzy0CKpRniDA7ba<br />
&#36;2y&#36;10&#36;2WUEvTpod4kZTIetKAol2e3U5pEmMgEZHQxu8i2OG6n15NQDphjpW<br />
&#36;2y&#36;10&#36;U6hbGrVC6IFaKn4aQg1VC.D9rOwfXzeu4k9sTIKe04rkZlvbLYJn.<br />
&#36;2y&#36;10&#36;hPa5gUZ3a0FAVa0ZaZzRyeKdCgyGGzEOXqNTy/E.CEVBC4PXGbVJa<br />
&#36;2y&#36;10&#36;eEdt2rpyf0da96dvOmkc/.D/VTqElLewrmtFFrr1hgmQBxphGoZym<br />
&#36;2y&#36;10&#36;1/5wwCuQjdsswm4et1AtC.5aYrFh5bTqyrXkr4lBbz9zBvz14HmxW]]></description>
			<content:encoded><![CDATA[3200 bcrypt &#36;2*&#36;, Blowfish (Unix)<br />
<br />
&#36;2y&#36;10&#36;niHcfy6W52pSll8pWm58pejS40sQECuELfQo1AQ/TfPf4Vjk.OBqi<br />
&#36;2y&#36;10&#36;mTpvv9zePFetR.Q7A/lPVupHJsb2AtzIidT2neMPlyno3x/hHDZ/C<br />
&#36;2y&#36;10&#36;onqQYKfeNlrVunNgUP0q1.xyqATCxW5ToVaHKaRzy0CKpRniDA7ba<br />
&#36;2y&#36;10&#36;2WUEvTpod4kZTIetKAol2e3U5pEmMgEZHQxu8i2OG6n15NQDphjpW<br />
&#36;2y&#36;10&#36;U6hbGrVC6IFaKn4aQg1VC.D9rOwfXzeu4k9sTIKe04rkZlvbLYJn.<br />
&#36;2y&#36;10&#36;hPa5gUZ3a0FAVa0ZaZzRyeKdCgyGGzEOXqNTy/E.CEVBC4PXGbVJa<br />
&#36;2y&#36;10&#36;eEdt2rpyf0da96dvOmkc/.D/VTqElLewrmtFFrr1hgmQBxphGoZym<br />
&#36;2y&#36;10&#36;1/5wwCuQjdsswm4et1AtC.5aYrFh5bTqyrXkr4lBbz9zBvz14HmxW]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[What is your hashcracking setup?]]></title>
			<link>https://pwnforums.st/Thread-What-is-your-hashcracking-setup</link>
			<pubDate>Sun, 29 Dec 2024 16:04:44 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=358349">sovrvltn</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-What-is-your-hashcracking-setup</guid>
			<description><![CDATA[I have been considering investing a couple thousand into a cracking rig, useful for some other projects too, what is everyone running? <br />
<br />
I have seen a few articles, like this one: <a href="https://www.secjuice.com/how-to-build-a-cracking-rig/" target="_blank" rel="noopener" class="mycode_url">https://www.secjuice.com/how-to-build-a-cracking-rig/</a>, but most seem to be fairly outdated. &#36;10k budget limit. Thinking that buying used GPUs is the way to go]]></description>
			<content:encoded><![CDATA[I have been considering investing a couple thousand into a cracking rig, useful for some other projects too, what is everyone running? <br />
<br />
I have seen a few articles, like this one: <a href="https://www.secjuice.com/how-to-build-a-cracking-rig/" target="_blank" rel="noopener" class="mycode_url">https://www.secjuice.com/how-to-build-a-cracking-rig/</a>, but most seem to be fairly outdated. &#36;10k budget limit. Thinking that buying used GPUs is the way to go]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[I need a Bruter for roblox accounts any tips?]]></title>
			<link>https://pwnforums.st/Thread-I-need-a-Bruter-for-roblox-accounts-any-tips</link>
			<pubDate>Fri, 27 Dec 2024 22:04:01 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=369647">Trstin</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-I-need-a-Bruter-for-roblox-accounts-any-tips</guid>
			<description><![CDATA[I need a bruter so I can get accs fast that bypasses funcaptcha and checks combolists.]]></description>
			<content:encoded><![CDATA[I need a bruter so I can get accs fast that bypasses funcaptcha and checks combolists.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[I can't decrypt the password (MD5+salt) can you help me?]]></title>
			<link>https://pwnforums.st/Thread-I-can-t-decrypt-the-password-MD5-salt-can-you-help-me</link>
			<pubDate>Mon, 25 Nov 2024 12:49:20 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=355824">Nosmoking7up</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-I-can-t-decrypt-the-password-MD5-salt-can-you-help-me</guid>
			<description><![CDATA[I need help to decrypt this password which is a MD5+salt. <br />
<br />
I've tries many dictionaries with john and hashcat but nothing. <br />
<br />
So please help me ! <br />
<br />
The password to crack : <br />
<br />
4ab411caa0fb4876fbcda8bde6298881:|X7-O]]></description>
			<content:encoded><![CDATA[I need help to decrypt this password which is a MD5+salt. <br />
<br />
I've tries many dictionaries with john and hashcat but nothing. <br />
<br />
So please help me ! <br />
<br />
The password to crack : <br />
<br />
4ab411caa0fb4876fbcda8bde6298881:|X7-O]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Big Basket SHA-1 Hash Cracking]]></title>
			<link>https://pwnforums.st/Thread-Big-Basket-SHA-1-Hash-Cracking</link>
			<pubDate>Thu, 21 Nov 2024 03:04:57 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=343718">ReverseForce</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Big-Basket-SHA-1-Hash-Cracking</guid>
			<description><![CDATA[Is there any way to solve the big basket leak's hashes?<br />
<br />
<a href="https://pwnforums.st/Thread-bigbasket-Database-Leaked-Download" target="_blank" rel="noopener" class="mycode_url">https://pwnforums.st/Thread-bigbasket...d-Download</a><br />
<br />
<br />
Example hash - sha1&#36;b3572&#36;c67ef66df323e92ef604464aae2c9fdede969d39]]></description>
			<content:encoded><![CDATA[Is there any way to solve the big basket leak's hashes?<br />
<br />
<a href="https://pwnforums.st/Thread-bigbasket-Database-Leaked-Download" target="_blank" rel="noopener" class="mycode_url">https://pwnforums.st/Thread-bigbasket...d-Download</a><br />
<br />
<br />
Example hash - sha1&#36;b3572&#36;c67ef66df323e92ef604464aae2c9fdede969d39]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Petition: list dehashed for dbs.]]></title>
			<link>https://pwnforums.st/Thread-Petition-list-dehashed-for-dbs</link>
			<pubDate>Wed, 13 Nov 2024 16:54:30 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=209569">boar</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Petition-list-dehashed-for-dbs</guid>
			<description><![CDATA[Appeal to all who have knowledge to explain or put the hashes defrados for each database. In particular, to identify exactly the type of format, salt, pepper and the exact structure of the hashes.]]></description>
			<content:encoded><![CDATA[Appeal to all who have knowledge to explain or put the hashes defrados for each database. In particular, to identify exactly the type of format, salt, pepper and the exact structure of the hashes.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Generates millions of keyword-based password mutations in seconds.]]></title>
			<link>https://pwnforums.st/Thread-Generates-millions-of-keyword-based-password-mutations-in-seconds</link>
			<pubDate>Wed, 23 Oct 2024 12:44:48 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=259014">global2141</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Generates-millions-of-keyword-based-password-mutations-in-seconds</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b">Psudohash</span> is a versatile password list generator designed for orchestrating brute force attacks and cracking hashes. It replicates common human password creation patterns to improve efficiency, including:<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Character Substitution (Leet)</span>: Converts letters to symbols/numbers (e.g., “password” to “p@ssw0rd”).<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Char-Case Variations</span>: Generates all possible case combinations.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Padding and Affixes</span>: Adds common strings before/after keywords (like “123”, “!”, “2024”).<br />
</li>
</ul>
The tool is keyword-based and highly customizable, allowing precise control over generated lists. If you're working with hash cracking or password security assessments, give Psudohash a try!<br />
<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b">Psudohash</span> is a versatile password list generator designed for orchestrating brute force attacks and cracking hashes. It replicates common human password creation patterns to improve efficiency, including:<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Character Substitution (Leet)</span>: Converts letters to symbols/numbers (e.g., “password” to “p@ssw0rd”).<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Char-Case Variations</span>: Generates all possible case combinations.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Padding and Affixes</span>: Adds common strings before/after keywords (like “123”, “!”, “2024”).<br />
</li>
</ul>
The tool is keyword-based and highly customizable, allowing precise control over generated lists. If you're working with hash cracking or password security assessments, give Psudohash a try!<br />
<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Successful custom wordlists]]></title>
			<link>https://pwnforums.st/Thread-Successful-custom-wordlists</link>
			<pubDate>Thu, 15 Aug 2024 22:32:07 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=277286">viceCoolMan</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Successful-custom-wordlists</guid>
			<description><![CDATA[Hello, I was cracking passwords with hashcat and finished all my wordlists. Now I needed more personal wordlists so I made a list of local sports teams, past 4 years, and the most common special characters. I used some John mangling rules so it produce words like Dolphins2022!. The list wasn't that big so hashcat flew through it and 2 passwords were cracked in under a minute. Taking this approach is effective if you are more specific to the user. I didn't think this would work but it helped uncover an admin password.]]></description>
			<content:encoded><![CDATA[Hello, I was cracking passwords with hashcat and finished all my wordlists. Now I needed more personal wordlists so I made a list of local sports teams, past 4 years, and the most common special characters. I used some John mangling rules so it produce words like Dolphins2022!. The list wasn't that big so hashcat flew through it and 2 passwords were cracked in under a minute. Taking this approach is effective if you are more specific to the user. I didn't think this would work but it helped uncover an admin password.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[doubt on 2024 rockyou hash table]]></title>
			<link>https://pwnforums.st/Thread-doubt-on-2024-rockyou-hash-table</link>
			<pubDate>Mon, 08 Jul 2024 15:57:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=230935">lslsakalsls</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-doubt-on-2024-rockyou-hash-table</guid>
			<description><![CDATA[Wondering what kind of PC spec that I can generate a full rainbow table of the dict? and how long?<br />
<br />
any other usage of the 2024 rockyou?]]></description>
			<content:encoded><![CDATA[Wondering what kind of PC spec that I can generate a full rainbow table of the dict? and how long?<br />
<br />
any other usage of the 2024 rockyou?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Hash Cracking / "Decryption" Service]]></title>
			<link>https://pwnforums.st/Thread-Hash-Cracking-Decryption-Service</link>
			<pubDate>Fri, 03 May 2024 11:29:38 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=214">Sneed</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Hash-Cracking-Decryption-Service</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="color: #e82a1f;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size">2026 Update - this service is still available!</span></span></div>
Sup BreachForums,<br />
Since posting my Swiss army knife thread, I've been receiving messages asking for help with bulk cracking or "decryption" of hashes. This service is primarily targeted towards those who have breached sites or bought private data, but don't have the knowledge or hardware to crack hashes.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">What can I crack?</span></span><br />
I have been cracking hashes as a hobby since 2019. I was a contributor to hashes.org and still regularly hold leaderboard positions on HashMob.<br />
This is not a service in which I just run 60 gigabytes of NCSC/rockyou lists and call it a day. I tailor dictionaries, rules, and masks to your target dataset in order to bring you the highest recovery rate in the shortest possible time. I am good at recognizing patterns, and I use them in further runs against the remaining hashes after the first cycle.<br />
Some algorithms are <span style="font-style: italic;" class="mycode_i">very </span>slow on GPUs and require specialized hardware or copious amounts of memory to efficiently crack - they're purposely designed this way. Unfortunately, I have to cut my losses for hash types that are not profitable to attack.<br />
I <span style="text-decoration: underline;" class="mycode_u">can</span> crack:<ul class="mycode_list"><li>MD5<br />
</li>
<li>SHA1<br />
</li>
<li>SHA2 and SHA3 families<br />
</li>
<li>Any salted variations of the above (AuthMe, etc)<br />
</li>
<li>NTLM<br />
</li>
<li>MySQL<br />
</li>
<li>Forum CMS hashes (vBulletin, MyBB, Invision, Simple Machines...)<br />
</li>
<li>Store CMS hashes (OpenCart, PrestaShop, OSCommerce...)<br />
</li>
<li>Anything not listed here? Ask me, I'll try it out<br />
</li>
</ul>
I <span style="text-decoration: underline;" class="mycode_u">cannot</span> crack GPU-resistant or memory-hardened algorithms, such as:<ul class="mycode_list"><li>Bcrypt<br />
</li>
<li>Argon2<br />
</li>
<li>Drupal7<br />
</li>
<li>PBKDF<br />
</li>
<li>PHPass with a high number of rounds<br />
</li>
<li>Anything that's salted but missing its salt column<br />
</li>
</ul>
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Working by percentage or per million</span></span><br />
Due to unpredictable factors such as list size, algorithm difficulty, and available GPU power, this service has no fixed rate. You decide how much you're willing to pay me. I'm open to all offers, so don't be shy - if a cracking site has already given you a rate, I can probably do it cheaper. You'll pay absolutely zero upfront.<br />
It is typically <span style="font-style: italic;" class="mycode_i">impossible </span>to achieve a 100% recovery rate on large hash lists. Unsalted lists have a higher recovery rate than salted lists. For this reason, I offer a percentage system. For example, if you offer me &#36;100 to crack 100,000 hashes, and I am only able to recover 80% of them, you only pay &#36;80. Alternatively, if you'd rather pay a set amount per thousand or per million hashes recovered, let me know your rate.<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Interested in this service?</span></span><br />
Message me on site with the following:<br />
-Your Telegram handle<br />
-Algorithm used for the hashes<br />
-A sample of the hashes<br />
-Your offer (USD/EUR), as explained in the section above<br />
Currently, I'm running a single-GPU rig which is seeing heavy demand. Higher offers will be prioritized.<br />
The rig will be upgraded soon, but you have to help me fund it <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fwink.png" alt="Wink" title="Wink" class="smilie smilie_2" /><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Payments accepted in</span></span><br />
<span style="color: #ffdc00;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">BTC</span></span> / <span style="font-weight: bold;" class="mycode_b"><span style="color: #ffffff;" class="mycode_color">ETH</span></span> / <span style="color: #005dc2;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">LTC</span></span> / <span style="color: #ff851b;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">XMR</span></span> / <span style="color: #17b529;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">USDT</span></span> / pretty much any other crypto coin - just ask<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Terms:</span></span><br />
-Please only submit fresh hash lists. I will not crack left lists from bounty sites that have already been attempted by dozens of other people.<br />
-If you have already attempted to crack the hashes yourself, that's fine. Just specify which dictionaries or masks you've used.<br />
-I reserve the right to cancel a job if the rate of recovery is too slow; much of it may be "garbage" or missing salts. You will not be charged for this.<br />
<span style="font-weight: bold;" class="mycode_b">Do not message me with single hashes. I will not crack them. It wastes both my time and yours. Minimum list size is 1,000 hashes.</span><br />
<br />
*(Yep, I know decryption is an incorrect term. However, I often see it mistranslated as such.)]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="color: #e82a1f;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size">2026 Update - this service is still available!</span></span></div>
Sup BreachForums,<br />
Since posting my Swiss army knife thread, I've been receiving messages asking for help with bulk cracking or "decryption" of hashes. This service is primarily targeted towards those who have breached sites or bought private data, but don't have the knowledge or hardware to crack hashes.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">What can I crack?</span></span><br />
I have been cracking hashes as a hobby since 2019. I was a contributor to hashes.org and still regularly hold leaderboard positions on HashMob.<br />
This is not a service in which I just run 60 gigabytes of NCSC/rockyou lists and call it a day. I tailor dictionaries, rules, and masks to your target dataset in order to bring you the highest recovery rate in the shortest possible time. I am good at recognizing patterns, and I use them in further runs against the remaining hashes after the first cycle.<br />
Some algorithms are <span style="font-style: italic;" class="mycode_i">very </span>slow on GPUs and require specialized hardware or copious amounts of memory to efficiently crack - they're purposely designed this way. Unfortunately, I have to cut my losses for hash types that are not profitable to attack.<br />
I <span style="text-decoration: underline;" class="mycode_u">can</span> crack:<ul class="mycode_list"><li>MD5<br />
</li>
<li>SHA1<br />
</li>
<li>SHA2 and SHA3 families<br />
</li>
<li>Any salted variations of the above (AuthMe, etc)<br />
</li>
<li>NTLM<br />
</li>
<li>MySQL<br />
</li>
<li>Forum CMS hashes (vBulletin, MyBB, Invision, Simple Machines...)<br />
</li>
<li>Store CMS hashes (OpenCart, PrestaShop, OSCommerce...)<br />
</li>
<li>Anything not listed here? Ask me, I'll try it out<br />
</li>
</ul>
I <span style="text-decoration: underline;" class="mycode_u">cannot</span> crack GPU-resistant or memory-hardened algorithms, such as:<ul class="mycode_list"><li>Bcrypt<br />
</li>
<li>Argon2<br />
</li>
<li>Drupal7<br />
</li>
<li>PBKDF<br />
</li>
<li>PHPass with a high number of rounds<br />
</li>
<li>Anything that's salted but missing its salt column<br />
</li>
</ul>
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Working by percentage or per million</span></span><br />
Due to unpredictable factors such as list size, algorithm difficulty, and available GPU power, this service has no fixed rate. You decide how much you're willing to pay me. I'm open to all offers, so don't be shy - if a cracking site has already given you a rate, I can probably do it cheaper. You'll pay absolutely zero upfront.<br />
It is typically <span style="font-style: italic;" class="mycode_i">impossible </span>to achieve a 100% recovery rate on large hash lists. Unsalted lists have a higher recovery rate than salted lists. For this reason, I offer a percentage system. For example, if you offer me &#36;100 to crack 100,000 hashes, and I am only able to recover 80% of them, you only pay &#36;80. Alternatively, if you'd rather pay a set amount per thousand or per million hashes recovered, let me know your rate.<br />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Interested in this service?</span></span><br />
Message me on site with the following:<br />
-Your Telegram handle<br />
-Algorithm used for the hashes<br />
-A sample of the hashes<br />
-Your offer (USD/EUR), as explained in the section above<br />
Currently, I'm running a single-GPU rig which is seeing heavy demand. Higher offers will be prioritized.<br />
The rig will be upgraded soon, but you have to help me fund it <img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpwnforums.st%2Fimages%2Fsmilies%2Fwink.png" alt="Wink" title="Wink" class="smilie smilie_2" /><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Payments accepted in</span></span><br />
<span style="color: #ffdc00;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">BTC</span></span> / <span style="font-weight: bold;" class="mycode_b"><span style="color: #ffffff;" class="mycode_color">ETH</span></span> / <span style="color: #005dc2;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">LTC</span></span> / <span style="color: #ff851b;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">XMR</span></span> / <span style="color: #17b529;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">USDT</span></span> / pretty much any other crypto coin - just ask<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Terms:</span></span><br />
-Please only submit fresh hash lists. I will not crack left lists from bounty sites that have already been attempted by dozens of other people.<br />
-If you have already attempted to crack the hashes yourself, that's fine. Just specify which dictionaries or masks you've used.<br />
-I reserve the right to cancel a job if the rate of recovery is too slow; much of it may be "garbage" or missing salts. You will not be charged for this.<br />
<span style="font-weight: bold;" class="mycode_b">Do not message me with single hashes. I will not crack them. It wastes both my time and yours. Minimum list size is 1,000 hashes.</span><br />
<br />
*(Yep, I know decryption is an incorrect term. However, I often see it mistranslated as such.)]]></content:encoded>
		</item>
	</channel>
</rss>