OP 25 April, 2020 - 09:53 PM
I recently dumped one database. The injectable link I got wasn't typical, it had public_ID and session_ID, I myself never experienced such thing. The website promotes Android app so the account logins I got are certainly from there. I easily dumped the database. The thing is I don't know how to crack the hashes. I'm certain they're MD5. Here is one example: 75cc1af2a4313261ff9d0f8bb013eebe. I tried to use Hashcat and it shows me 1 hour estimated at 8/15 so time would only go higher at this point. I tried to find salt column, but with 0 success. I never had any salted database. Maybe salt columns can be named differently?
Here are some screenshots:
I consider myself noob at cracking, but I simply couldn't find any info about this so I ask you to help me. Any help is appreciated, thank you in advance.
Here are some screenshots:
Spoiler: