Bitcoin Forum
April 24, 2024, 06:26:53 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: can anyone tell me what is this code means?  (Read 1726 times)
Xiong Zhuang (OP)
Member
**
Offline Offline

Activity: 102
Merit: 10


View Profile
June 05, 2011, 03:24:31 PM
 #1

http://www.glitcheaven.com/paste/?show=33

It is very important for me, I am tracing a scam. Please help me.
Remember that Bitcoin is still beta software. Don't put all of your money into BTC!
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713940013
Hero Member
*
Offline Offline

Posts: 1713940013

View Profile Personal Message (Offline)

Ignore
1713940013
Reply with quote  #2

1713940013
Report to moderator
1713940013
Hero Member
*
Offline Offline

Posts: 1713940013

View Profile Personal Message (Offline)

Ignore
1713940013
Reply with quote  #2

1713940013
Report to moderator
1713940013
Hero Member
*
Offline Offline

Posts: 1713940013

View Profile Personal Message (Offline)

Ignore
1713940013
Reply with quote  #2

1713940013
Report to moderator
PIO
Newbie
*
Offline Offline

Activity: 27
Merit: 0


View Profile
June 05, 2011, 03:25:25 PM
 #2

Usernames + some kind of hash?HuhHuhHuhHuh?
crash893
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
June 05, 2011, 03:30:36 PM
 #3

the password seems to be hashed with a salt

witch basically means that your not going to reverse engineer what the password is.

if you wanted to figure it out in theory you would have to have a known password and then see what the salt is Hash(password+salt) = the answer


Xiong Zhuang (OP)
Member
**
Offline Offline

Activity: 102
Merit: 10


View Profile
June 05, 2011, 03:35:50 PM
 #4

the password seems to be hashed with a salt

witch basically means that your not going to reverse engineer what the password is.

if you wanted to figure it out in theory you would have to have a known password and then see what the salt is Hash(password+salt) = the answer



Thanks for you answer, but I have a question:
For example the line 7:
Admin:c752ce49e7b6d62ca576d6951f155a6b:-rFR'';3EPpgJYlb`,TN.)#)6hXn9{, ImmidsBiamY:198dc22576304ee4a008add15797f957:XY2x&:u7="@/y98^3++#Qe=RIskK:2,
The word ImmidsBiamY is not any hashed code, so what is it?
Xiong Zhuang (OP)
Member
**
Offline Offline

Activity: 102
Merit: 10


View Profile
June 05, 2011, 03:59:46 PM
 #5

the password seems to be hashed with a salt

witch basically means that your not going to reverse engineer what the password is.

if you wanted to figure it out in theory you would have to have a known password and then see what the salt is Hash(password+salt) = the answer



Thanks for you answer, but I have a question:
For example the line 7:
Admin:c752ce49e7b6d62ca576d6951f155a6b:-rFR'';3EPpgJYlb`,TN.)#)6hXn9{, ImmidsBiamY:198dc22576304ee4a008add15797f957:XY2x&:u7="@/y98^3++#Qe=RIskK:2,
The word ImmidsBiamY is not any hashed code, so what is it?

I get it, it just another username.
eof
Full Member
***
Offline Offline

Activity: 156
Merit: 100


View Profile
June 05, 2011, 04:58:05 PM
 #6

the hashes are probably md5'd passwords, then the random characters after the colon could be user specific salts for the password hashes
Xiong Zhuang (OP)
Member
**
Offline Offline

Activity: 102
Merit: 10


View Profile
June 05, 2011, 05:02:06 PM
 #7

the hashes are probably md5'd passwords, then the random characters after the colon could be user specific salts for the password hashes

So it not possible to crack it. Sigh.
eof
Full Member
***
Offline Offline

Activity: 156
Merit: 100


View Profile
June 05, 2011, 05:04:51 PM
 #8

if you don't think the users used strong passwords you could still take a whack at it if you've got access to a couple gpus; but if they used good passwords then basically no, you can't.
eof
Full Member
***
Offline Offline

Activity: 156
Merit: 100


View Profile
June 05, 2011, 05:05:35 PM
 #9

but, if i am wrong about the per-user salts, (it was just a guess) then you could attack with rainbow tables.
RodeoX
Legendary
*
Offline Offline

Activity: 3066
Merit: 1145


The revolution will be monetized!


View Profile
June 05, 2011, 08:50:04 PM
 #10

Just for verification i checked, the hashy looking string is not an Md5 of the username.

The gospel according to Satoshi - https://bitcoin.org/bitcoin.pdf
Free bitcoin in ? - Stay tuned for this years Bitcoin hunt!
Maged
Legendary
*
Offline Offline

Activity: 1204
Merit: 1015


View Profile
June 05, 2011, 09:45:52 PM
 #11

Found the hacked site:
http://money-forum.org/

Anyone wanna alert them? I'd suggest doing so behind Tor, less they think you were the hacker.

crash893
Newbie
*
Offline Offline

Activity: 22
Merit: 0


View Profile
June 06, 2011, 02:52:27 PM
 #12

you could try to run a rainbow table on the hash to see if anything comes up but to be honest its just a shot in the dark.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!