A hash wanted to be cracked

Discussion in 'Crack My Hash' started by Poison, Jul 24, 2015.

  1. Poison

    Poison New Member

    Messages:
    62
    Likes:
    1
    Ratio:
    0
    Hi everyone,

    I've got this hash ( 2f841e871b6415df321a4b5941b9f649 ) , I think it's a MD5 one.
    Nevertheless, I dont have that knowledge to crack it, or even to recognise its type specifically.
    So, anyone can help with this?.....

    Thanks in advance,,,
     
  2. tireN1337

    tireN1337 Well-Known Member Moderator Trusted Seller

    Messages:
    1,499
    Likes:
    2,511
    Ratio:
    0.71
    I tried to unhash with Password Pro with more than 1 billion directory, also Online Reverse Hash tool and one private program and still no result. Probably some really hard password.
     
  3. seNs

    seNs Active Member

    Messages:
    970
    Likes:
    663
    Ratio:
    1.06
    It can be any of those atleast that what my tool identify it as:

    - MD5
    - NTLM
    - MD4
    - LM
    - RAdmin v2.x
    - Haval-128
    - MD2
    - RipeMD-128
    - Tiger-128
    - Snefru-128
    - MD5(HMAC)
    - MD4(HMAC)
    - Haval-128(HMAC)
    - RipeMD-128(HMAC)
    - Tiger-128(HMAC)
    - Snefru-128(HMAC)
    - MD2(HMAC)
    - MD5(ZipMonster)
    - MD5(HMAC(Wordpress))
    - Skein-256(128)
    - Skein-512(128)
    - md5($pass.$salt)
    - md5($pass.$salt.$pass)
    - md5($pass.md5($pass))
    - md5($salt.$pass)
    - md5($salt.$pass.$salt)
    - md5($salt.$pass.$username)
    - md5($salt.'-'.md5($pass))
    - md5($salt.md5($pass))
    - md5($salt.md5($pass).$salt)
    - md5($salt.MD5($pass).$username)
    - md5($salt.md5($pass.$salt))
    - md5($salt.md5($salt.$pass))
    - md5($salt.md5(md5($pass).$salt))
    - md5($username.0.$pass)
    - md5($username.LF.$pass)
    - md5($username.md5($pass).$salt)
    - md5(1.$pass.$salt)
    - md5(3 x strtoupper(md5($pass)))
    - md5(md5($pass)), Double MD5
    - md5(md5($pass).$pass)
    - md5(md5($pass).$salt), vBulletin < v3.8.5
    - md4($salt.$pass)
    - md4($pass.$salt)md5(md5($pass).md5($pass))
    - md5(md5($pass).md5($salt))
    - md5(md5($salt).$pass)
    - md5(md5($salt).md5($pass))
    - md5(md5($username.$pass).$salt)
    - md5(md5(base64_encode($pass)))
    - md5(md5(md5($pass)))
    - md5(md5(md5(md5($pass))))
    - md5(md5(md5(md5(md5($pass)))))
    - md5(sha1($pass))
    - md5(sha1(base64_encode($pass)))
    - md5(sha1(md5($pass)))
    - md5(sha1(md5($pass)).sha1($pass))
    - md5(sha1(md5(sha1($pass))))
    - md5(strrev($pass))
    - md5(strrev(md5($pass)))
    - md5(strtoupper(md5($pass)))
    - md5(strtoupper(md5(strtoupper(md5(strtoupper(md5($pass)))))))
    - strrev(md5($pass))
    - strrev(md5(strrev(md5($pass))))
    - 6 x md5($pass)
    - 7 x md5($pass)
    - 8 x md5($pass)
    - 9 x md5($pass)
    - 10 x md5($pass)
    - 11 x md5($pass)
    - 12 x md5($pass)
     

Share This Page