Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 3756

Anyone know what hash type this is ?

by Micro - 13 January, 2023 - 04:10 PM
This post is by a banned member (Micro) - Unhide
Micro  
Supreme
1.153
Posts
885
Threads
6 Years of service
#1
(This post was last modified: 13 January, 2023 - 04:11 PM by Micro. Edited 1 time in total.)
The password in plain-text: test
The password hashed: E869A9362BC241FD91BC88D8E0E868F1

When I use hash identfying websites it tells me its MD5, but its not lol.
Any help is appreciated!
[Image: tumblr_o4igioqRRY1qghl49o1_540.gifv]

Barely on C.to anymore...

Contact me using this link
This post is by a banned member (DEMARKATOR) - Unhide
This post is by a banned member (Micro) - Unhide
Micro  
Supreme
1.153
Posts
885
Threads
6 Years of service
#3
(13 January, 2023 - 04:12 PM)DEMARKATOR Wrote: Show More
depending on a tool i have it could be one of these 
u can try encrypting the password using these and comparing it to the one u have  


- MD2
- MD5
- MD4
- Double MD5
- LM
- RIPEMD-128
- Haval-128
- Tiger-128
- Skein-256(128)
- Skein-512(128)
- Lotus Notes/Domino 5
- Skype
- ZipMonster
- PrestaShop
- md5(md5(md5($pass)))
- md5(strtoupper(md5($pass)))
- md5(sha1($pass))
- md5($pass.$salt)
- md5($salt.$pass)
- md5(unicode($pass).$salt)
- md5($salt.unicode($pass))
- HMAC-MD5 (key = $pass)
- HMAC-MD5 (key = $salt)
- md5(md5($salt).$pass)
- md5($salt.md5($pass))
- md5($pass.md5($salt))
- md5($salt.$pass.$salt)
- md5(md5($pass).md5($salt))
- md5($salt.md5($salt.$pass))
- md5($salt.md5($pass.$salt))
- md5($username.0.$pass)
- Snefru-128
- NTLM
- Domain Cached Credentials
- Domain Cached Credentials 2
- DNSSEC(NSEC3)
- RAdmin v2.x
- Cisco Type 7

I tried all of them, but it's not one of those. :(
[Image: tumblr_o4igioqRRY1qghl49o1_540.gifv]

Barely on C.to anymore...

Contact me using this link
This post is by a banned member (MrUniversal9) - Unhide
17
Posts
0
Threads
1 Year of service
#4
Hashes are one way functions, you cannot get the password by inversing the hash value.
You need to make password and convert it to all the hashes mentioned and compare the hash value. If all the hashes are not working , then I guess it has added some salt values to make it more difficult to crack.

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)