decrypting

fes

Member
Reputation
0
can someone help me please understand how to decrypt things from the database?
 
All I know so far about the database is that everything is hashed and salted. Not sure on how to go about desalting or decrypting hash. :\

eXero said:
What database?

And, do you know what type of encryption was used? MD5?

The DB look-up that premiums have access to. I believe it is MD5.
 
eXero said:
What database?

And, do you know what type of encryption was used? MD5?

honestly i do not know one thing about decrypting i would like to learn
 
Well you need to figure out what type of encryption method was used before you decrypt it?
 
eXero said:
Well you need to figure out what type of encryption method was used before you decrypt it?

Deathcrow said:
All I know so far about the database is that everything is hashed and salted. Not sure on how to go about desalting or decrypting hash. :\

eXero said:
What database?

And, do you know what type of encryption was used? MD5?

The DB look-up that premiums have access to. I believe it is MD5.
 
If its a MD5 hash, it could take like a day decrypt just one because its so difficult.

It takes an entire computer to decrypt them.
 
eXero said:
If its a MD5 hash, it could take like a day decrypt just one because its so difficult.

It takes an entire computer to decrypt them.

Damn. That's some serious stuff.
 
It is.

Other encryption methods, like AES, and RC4 and stuff, take only a few minutes to decrypt, and can be decrypted via the plethora of websites found on the interet.
 
eXero said:
It is.

Other encryption methods, like AES, and RC4 and stuff, take only a few minutes to decrypt, and can be decrypted via the plethora of websites found on the interet.

So how could one go about decrypting MD5 and also desalting the encryption?

I am guessing it involves going through tons of libraries?
 
Hashing is a one way process. You can hash something but not unhash it. You'd need to get a powerful computer to bruteforce it, which will be even harder seeing as there's a salt.
 
Darth Stabro said:
Hashing is a one way process. You can hash something but not unhash it. You'd need to get a powerful computer to bruteforce it, which will be even harder seeing as there's a salt.

Ouch, so what was the point of the Database look-up?

EDIT: Hi, Darth! Nice to see you post something. :)
 
slack3r said:
www.cmd5.ru

Cracked vbulletin hash @ 70% rate for me.

i do not know if i am using this wrong i do not understand the language to see if i am inputting the items they want in right
 
eXero said:
If its a MD5 hash, it could take like a day decrypt just one because its so difficult.

It takes an entire computer to decrypt them.

Takes about 7 hours with a proper rig.
 
@"slack3r"

What format are most of the passwords in the DB Lookup in?

For example I got this: 1dc5e9928696d15fa6d75883d6e07ba3:QHKTG[(@4-]'?+:EgZKadcN#agav`.

Is that md5($pass.$salt)?

Thanks in advance.
 
Back
Top