flat assembler
Message board for the users of flat assembler.
Index
> Projects and Ideas > MD5 Password Recovery Tool Goto page Previous 1, 2, 3, 4 Next |
Author |
|
sylwek32 04 Jun 2006, 23:52
Quote:
Has somebody webspace for me ? Can upload over 100GB of Tables lol IF somebody has Webspace THEN : can you give me some ? It would be very very good if it were Webspace under Linux with some limited shell access |
|||
04 Jun 2006, 23:52 |
|
Turok 05 Jun 2006, 00:21
I always thought that rainbow table just makes a normal table and searches it, but that way it would take too much space, so it never got my attention Now i see that its much more behind it:
http://lasecwww.epfl.ch/pub/lasec/doc/Oech03.pdf However salting kills the rainbow So we still need bruteforce |
|||
05 Jun 2006, 00:21 |
|
sylwek32 05 Jun 2006, 00:36
Hey , does somebody know Boinc ?
Maybe we can make a Boinc Project wich uses this FASM app.. And so it can convert a 16 Chr md5 in under <10sec.. - Boinc is distributed computing.. Has somebody here worked with Distributed computing ? If yes i need more info. Keywords: Linux, Debian .. |
|||
05 Jun 2006, 00:36 |
|
saigon 05 Jun 2006, 07:22
@sylwek32: I have not, but sounds interesting... if you can crack a MD5 hash with 16 characters in under 10sec, then WOW! And, BTW: Nobody gives 100Gb for free, people might think you want to upload illegal stuff ..
@UCM: I tested the running variable and yes it's zero, but the program still alerts that the thread is running. I know this is very odd, but I'm not lying. |
|||
05 Jun 2006, 07:22 |
|
UCM 05 Jun 2006, 12:00
Maybe the thread is not being created properly, and the code is (accidentally) running into the already running part... (bug on my part)
Try using this version, if it just closes then the thread wasn't created Note: this version has a 'Clear' button EDIT: There may have been a different bug too, fixed that as well
_________________ This calls for... Ultra CRUNCHY Man! Ta da!! *crunch* |
|||||||||||
05 Jun 2006, 12:00 |
|
saigon 05 Jun 2006, 21:30
UCM, that version works perfectly! I don't get any error and the program recovers the passwords quickly (Your version seems to be faster than Turok's). Thanks a lot!
|
|||
05 Jun 2006, 21:30 |
|
sylwek32 05 Jun 2006, 22:29
very nice !
UCM good work |
|||
05 Jun 2006, 22:29 |
|
sylwek32 05 Jun 2006, 22:35
Have one question.. again :/..
How to make it run under dos shell or in CMD? It would be great if it can work in Commandline. - Accept commandline args.. - Show output in console... |
|||
05 Jun 2006, 22:35 |
|
UCM 06 Jun 2006, 01:34
Like this!
Maybe I have too much time on my hands. This program tries to detect what part of the command line is its own program name, and the 32 characters of the rest (after the space, of course) are used as the MD5 hash. If there are less than 32 characters it is supposed to report an error, but it doesn't work (for some reason.) If you run it normally, you will see 2 of the resulting string corresponding to the hash. This is because it can be redirected to a file or piped to a different program, and the string alone will be sent and the rest will go to the console. (Check the source and try 'md5prtwin32con 12227AC1EA36D1AB2C0656099BE9F8CB > blah.txt' to see what I mean.) EDIT: Well, I fixed it now.
_________________ This calls for... Ultra CRUNCHY Man! Ta da!! *crunch* |
|||||||||||
06 Jun 2006, 01:34 |
|
sylwek32 06 Jun 2006, 12:01
@UCM : Thanks.. Works good! Faster than the GUI version
Ps: it works only at 1 Processor at a Dual Processor machine , right ? Is it a lot of work to make it run under 2 CPU's ? I want to use the Full power of my Tyan Tiger 2xAthlonMP 2000 machine Greetings... |
|||
06 Jun 2006, 12:01 |
|
sylwek32 06 Jun 2006, 13:20
Hi you all !
I have made a .exe from the asm file , compressed it with upx.. And now it´s ~6KB !! That´s very nice for a MD5 recovery tool Here it is.. you can download...
|
|||||||||||
06 Jun 2006, 13:20 |
|
Quantum 06 Jun 2006, 18:38
And then you embed a 600K xm track and make the executable image 100 times bigger
|
|||
06 Jun 2006, 18:38 |
|
sylwek32 06 Jun 2006, 21:12
lol
no.. the xm emb. example was needed for something other.. just wanted to see how it works |
|||
06 Jun 2006, 21:12 |
|
sina 07 Jun 2006, 09:07
i think a progress bar or just simply a turning "/" char would be fine to see it working
and hmmm being able to chose character set, casing, numbers |
|||
07 Jun 2006, 09:07 |
|
Feryno 07 Jun 2006, 09:36
Hello guys, if you use 128-bit xmm registers, you'll be able to calculate 4 hashes every cycle (really speed-up).
Download lovec64 from my home page (has brute force password generating routine for 4 passwords in 1 cycle too). |
|||
07 Jun 2006, 09:36 |
|
sylwek32 07 Jun 2006, 21:31
cool it removed a very long password from my word doc. in 5 secounds on a Dual Machine
|
|||
07 Jun 2006, 21:31 |
|
sylwek32 09 Jun 2006, 06:20
Maybe somebody can add a code which shows on what time a function beginned...
Sorry for that english^^ So: - 19:00 - MD5 RECOVERY STARTED - 19:01 - CHARS: 5 - 19:44 - CHARS: 9 - 20:00 - Found = [RESuLT] or an external log file with all informations... e.G. CPU Type , Speed , Recovery Speed , and.. you know.. |
|||
09 Jun 2006, 06:20 |
|
Patrick_ 16 Jun 2006, 15:08
I wrote a brute-forcer that is quite a bit (at least 100%) faster than this program. It also tells you how long it took to crack the hash. Link below to my post.
http://board.flatassembler.net/topic.php?p=40254#40254 |
|||
16 Jun 2006, 15:08 |
|
sylwek32 16 Jun 2006, 17:46
Try to crack this:
a2c8f5651443c74f1a673a5514ff5e70 it are 6 chrs |
|||
16 Jun 2006, 17:46 |
|
Goto page Previous 1, 2, 3, 4 Next < Last Thread | Next Thread > |
Forum Rules:
|
Copyright © 1999-2025, Tomasz Grysztar. Also on GitHub, YouTube.
Website powered by rwasa.