Bitcoin Forum
December 10, 2016, 09:13:06 AM *
News: Latest stable version of Bitcoin Core: 0.13.1  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: [1]
  Print  
Author Topic: can anyone tell me what is this code means?  (Read 1472 times)
Xiong Zhuang
Member
**
Offline Offline

Activity: 102


View Profile
June 05, 2011, 03:24:31 PM
 #1

http://www.glitcheaven.com/paste/?show=33

It is very important for me, I am tracing a scam. Please help me.
1481361186
Hero Member
*
Offline Offline

Posts: 1481361186

View Profile Personal Message (Offline)

Ignore
1481361186
Reply with quote  #2

1481361186
Report to moderator
1481361186
Hero Member
*
Offline Offline

Posts: 1481361186

View Profile Personal Message (Offline)

Ignore
1481361186
Reply with quote  #2

1481361186
Report to moderator
1481361186
Hero Member
*
Offline Offline

Posts: 1481361186

View Profile Personal Message (Offline)

Ignore
1481361186
Reply with quote  #2

1481361186
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1481361186
Hero Member
*
Offline Offline

Posts: 1481361186

View Profile Personal Message (Offline)

Ignore
1481361186
Reply with quote  #2

1481361186
Report to moderator
1481361186
Hero Member
*
Offline Offline

Posts: 1481361186

View Profile Personal Message (Offline)

Ignore
1481361186
Reply with quote  #2

1481361186
Report to moderator
1481361186
Hero Member
*
Offline Offline

Posts: 1481361186

View Profile Personal Message (Offline)

Ignore
1481361186
Reply with quote  #2

1481361186
Report to moderator
PIO
Newbie
*
Offline Offline

Activity: 27


View Profile
June 05, 2011, 03:25:25 PM
 #2

Usernames + some kind of hash?HuhHuhHuhHuh?
crash893
Newbie
*
Offline Offline

Activity: 22


View Profile
June 05, 2011, 03:30:36 PM
 #3

the password seems to be hashed with a salt

witch basically means that your not going to reverse engineer what the password is.

if you wanted to figure it out in theory you would have to have a known password and then see what the salt is Hash(password+salt) = the answer


Xiong Zhuang
Member
**
Offline Offline

Activity: 102


View Profile
June 05, 2011, 03:35:50 PM
 #4

the password seems to be hashed with a salt

witch basically means that your not going to reverse engineer what the password is.

if you wanted to figure it out in theory you would have to have a known password and then see what the salt is Hash(password+salt) = the answer



Thanks for you answer, but I have a question:
For example the line 7:
Admin:c752ce49e7b6d62ca576d6951f155a6b:-rFR'';3EPpgJYlb`,TN.)#)6hXn9{, ImmidsBiamY:198dc22576304ee4a008add15797f957:XY2x&:u7="@/y98^3++#Qe=RIskK:2,
The word ImmidsBiamY is not any hashed code, so what is it?
Xiong Zhuang
Member
**
Offline Offline

Activity: 102


View Profile
June 05, 2011, 03:59:46 PM
 #5

the password seems to be hashed with a salt

witch basically means that your not going to reverse engineer what the password is.

if you wanted to figure it out in theory you would have to have a known password and then see what the salt is Hash(password+salt) = the answer



Thanks for you answer, but I have a question:
For example the line 7:
Admin:c752ce49e7b6d62ca576d6951f155a6b:-rFR'';3EPpgJYlb`,TN.)#)6hXn9{, ImmidsBiamY:198dc22576304ee4a008add15797f957:XY2x&:u7="@/y98^3++#Qe=RIskK:2,
The word ImmidsBiamY is not any hashed code, so what is it?

I get it, it just another username.
eof
Full Member
***
Offline Offline

Activity: 156


View Profile
June 05, 2011, 04:58:05 PM
 #6

the hashes are probably md5'd passwords, then the random characters after the colon could be user specific salts for the password hashes
Xiong Zhuang
Member
**
Offline Offline

Activity: 102


View Profile
June 05, 2011, 05:02:06 PM
 #7

the hashes are probably md5'd passwords, then the random characters after the colon could be user specific salts for the password hashes

So it not possible to crack it. Sigh.
eof
Full Member
***
Offline Offline

Activity: 156


View Profile
June 05, 2011, 05:04:51 PM
 #8

if you don't think the users used strong passwords you could still take a whack at it if you've got access to a couple gpus; but if they used good passwords then basically no, you can't.
eof
Full Member
***
Offline Offline

Activity: 156


View Profile
June 05, 2011, 05:05:35 PM
 #9

but, if i am wrong about the per-user salts, (it was just a guess) then you could attack with rainbow tables.
RodeoX
Legendary
*
Offline Offline

Activity: 2114


The revolution will be monetized!


View Profile
June 05, 2011, 08:50:04 PM
 #10

Just for verification i checked, the hashy looking string is not an Md5 of the username.

The gospel according to Satoshi - https://bitcoin.org/bitcoin.pdf

Free bitcoin=https://bitcointalk.org/index.php?topic=1610684
Maged
Legendary
*
Offline Offline

Activity: 1260


View Profile
June 05, 2011, 09:45:52 PM
 #11

Found the hacked site:
http://money-forum.org/

Anyone wanna alert them? I'd suggest doing so behind Tor, less they think you were the hacker.

crash893
Newbie
*
Offline Offline

Activity: 22


View Profile
June 06, 2011, 02:52:27 PM
 #12

you could try to run a rainbow table on the hash to see if anything comes up but to be honest its just a shot in the dark.

Pages: [1]
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!