EvilZone
Other => Found it on the Webs => : GuerrillaWarfare August 25, 2014, 08:30:45 PM
-
After reading m0rphs (https://evilzone.org/profile/?u=1000) Assumption-based GPU Hash Cracking Theory (http://evilzone.org/tutorials/assumption-based-gpu-hash-cracking-theory/), I became interested to check out his theory and have dedicated some of my time and research to applying this theory to my methods of madness.
So with m0rphs (https://evilzone.org/profile/?u=1000) Research Theory and my interest with applying this theory to a practical situation i found Hashes.org (https://hashes.org/). Hashes.org is a place that contains hashes (mostly MD5).
What Hashes.org provides:
Their database contains 380'369'610 cracked and 48'976'986 uncracked hashes, Hashes.org is not a hacking site and assumes all submitted hashes are for testing purposes only and are obtained in a legal way.
They Have PUBLIC Leaked Lists (https://hashes.org/public.php) full of user submitted Hashes (MOSTLY MD5) and Progress Percentages pertaining to how many hashes were cracked.
They also have a Crackers area (https://hashes.org/crackers.php) which is updated every 2 hours according to them. It's pretty interesting, go check it out.
Since "Hashcat (http://hashcat.net/oclhashcat/)" - is an advanced password recovery tool, it's the perfect tool to crack hashes with. With that being said P.A.C.K (https://thesprawl.org/projects/pack/) a Password Analysis and Cracking Kit is a GREAT tool for creating masks from a word-list of almost any kind to use with Hashcat.
PACK (Password Analysis and Cracking Toolkit) is a collection of utilities developed to aid in analysis of password lists in order to enhance password cracking through pattern detection of masks, rules, character-sets and other password characteristics. The toolkit generates valid input files for Hashcat family of password crackers.
Sources:
m0rph (https://evilzone.org/profile/?u=1000)
P.A.C.K (https://thesprawl.org/projects/pack/)
Hashcat (http://hashcat.net/oclhashcat/)
Hashes.org (https://hashes.org/)
RANDOM Disclaimer:
I am not responsible for what you do with this Knowledge.
Enjoy! ;)