Bitcoin Forum
May 25, 2024, 04:52:51 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: onionkrack - tor based hash recovery for bitcoins  (Read 1473 times)
a654bdff (OP)
Newbie
*
Offline Offline

Activity: 10
Merit: 0



View Profile
May 27, 2012, 03:06:49 PM
Last edit: May 28, 2012, 01:04:21 AM by a654bdff
 #1

onionkrack - accelerated hash recovery

http://krack7rkenltz3gj.onion/
(note: hidden service, you must access through tor)

For the non-tor savvy, etc:

https://krack7rkenltz3gj.tor2web.org/
(note: this defeats part of the purpose of a hidden service, use at your own discretion)

  • For legitimate use only - penetration testing, data/networks that you have access to.  We do not endorse or condone unauthorized access.
  • GPU accelerated hash recovery - multi-gig multi-language dictionaries, common permutations, brute patterns.
  • Simple pricing - $5 USD BTC for single hash, $10 USD BTC for dcc2/mscash2/WPA.
  • If your hash is not recovered - you get a half refund.
  • Nearly completely automated process - including payment confirmation and refunds.
  • Humans reachable via email for any issues - a654bdff@tormail.org

a654bdff (OP)
Newbie
*
Offline Offline

Activity: 10
Merit: 0



View Profile
July 04, 2012, 11:12:35 PM
 #2

Prices reduced 50% for the month of July ! 

Standard hash: $2.50 USD/BTC
MSCASH2/WPA: $5.00 USD/BTC
danieldaniel
Hero Member
*****
Offline Offline

Activity: 854
Merit: 1000


View Profile
July 04, 2012, 11:26:14 PM
 #3

How long does it take to decrypt one?  Might just make a hash and try it.  Wink

a654bdff (OP)
Newbie
*
Offline Offline

Activity: 10
Merit: 0



View Profile
July 04, 2012, 11:51:10 PM
 #4

How long does it take to decrypt one?  Might just make a hash and try it.  Wink

Great question.  The short answer is - it depends  Undecided

We currently have our resources and wordlists such that it takes between 12-24 hours to exhaust a given hash.  For 'fast' hashes - this time is obviously shorter.  For 'slow' hashes (i.e. WPA) - it can go to ~ 24 hours.  Again - this is for exhausting the search.  We search dictionaries (meaning actual dictionaries, lists of popular 'leaked' passwords, etc).  So if it's a hit, it will be pretty quick.  Once our system runs through those - we enter the 'wasteland' of brute patterns.  We can afford to do more of these on longer lengths on 'fast' algos, and much less on 'slow' (WPA).

So this is why WPA is double the price - as well as why we offer a half refund for hashes not found.  If the hash is on a password that is long enough/contains special characters/etc (i.e. all the good password practices that everyone should be using  Smiley) - it won't be found.

So yes, if you submit a hash - it would be a good test (for both you and us).  Thanks.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!