Bitcoin Forum

Economy => Services => Topic started by: a654bdff on May 27, 2012, 03:06:49 PM



Title: onionkrack - tor based hash recovery for bitcoins
Post by: a654bdff on May 27, 2012, 03:06:49 PM
onionkrack - accelerated hash recovery

http://krack7rkenltz3gj.onion/ (http://krack7rkenltz3gj.onion/)
(note: hidden service, you must access through tor)

For the non-tor savvy, etc:

https://krack7rkenltz3gj.tor2web.org/ (https://krack7rkenltz3gj.tor2web.org/)
(note: this defeats part of the purpose of a hidden service, use at your own discretion)

  • For legitimate use only - penetration testing, data/networks that you have access to.  We do not endorse or condone unauthorized access.
  • GPU accelerated hash recovery - multi-gig multi-language dictionaries, common permutations, brute patterns.
  • Simple pricing - $5 USD BTC for single hash, $10 USD BTC for dcc2/mscash2/WPA.
  • If your hash is not recovered - you get a half refund.
  • Nearly completely automated process - including payment confirmation and refunds.
  • Humans reachable via email for any issues - a654bdff@tormail.org



Title: Re: onionkrack - tor based hash recovery for bitcoins
Post by: a654bdff on July 04, 2012, 11:12:35 PM
Prices reduced 50% for the month of July ! 

Standard hash: $2.50 USD/BTC
MSCASH2/WPA: $5.00 USD/BTC


Title: Re: onionkrack - tor based hash recovery for bitcoins
Post by: danieldaniel on July 04, 2012, 11:26:14 PM
How long does it take to decrypt one?  Might just make a hash and try it.  ;)


Title: Re: onionkrack - tor based hash recovery for bitcoins
Post by: a654bdff on July 04, 2012, 11:51:10 PM
How long does it take to decrypt one?  Might just make a hash and try it.  ;)

Great question.  The short answer is - it depends  :-\

We currently have our resources and wordlists such that it takes between 12-24 hours to exhaust a given hash.  For 'fast' hashes - this time is obviously shorter.  For 'slow' hashes (i.e. WPA) - it can go to ~ 24 hours.  Again - this is for exhausting the search.  We search dictionaries (meaning actual dictionaries, lists of popular 'leaked' passwords, etc).  So if it's a hit, it will be pretty quick.  Once our system runs through those - we enter the 'wasteland' of brute patterns.  We can afford to do more of these on longer lengths on 'fast' algos, and much less on 'slow' (WPA).

So this is why WPA is double the price - as well as why we offer a half refund for hashes not found.  If the hash is on a password that is long enough/contains special characters/etc (i.e. all the good password practices that everyone should be using  :)) - it won't be found.

So yes, if you submit a hash - it would be a good test (for both you and us).  Thanks.