19 March, 2021 - 12:39 PM
cheers bro thx
This post is by a banned member (Bullseye107) - Unhide
OP 19 March, 2021 - 01:07 PM
(This post was last modified: 19 March, 2021 - 01:16 PM by Bullseye107.)
If the passwords obtained from SQLi Dumper 10.1 are looking like 040cad239a87f251a129954c85a0a4b9, that thing shows that they are hashed/encrypted. To unhash/decrypt them you can use this website (paste all the passwords on it and click on "Dehash Me !"): https://dehash.me/. Paste the unhashed password from this website into a notepad and use Botop Combo Utilities to combine again the usernames with the unhashed passwords (the tool is provided in the Cracking tools - pack and you can find how you need to use it in this tutorial).
If you don't wish to use that website, you can search programs which unhash/decrypt passwords on this forum. |
Create an account or sign in to comment | ||
You need to be a member in order to leave a comment | ||
Create an account
Sign up for a new account in our community. It's easy!
|
or |
Sign in
Already have an account? Sign in here.
|