Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. Tools
  3. Scripts
  4. Quick Way to Crack VB 2611 Salts

Quick Way to Crack VB 2611 Salts

Scheduled Pinned Locked Moved Scripts
2 Posts 1 Posters 245 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A1131A Offline
    A1131A Offline
    A1131
    Trusted
    wrote on last edited by cyclone
    #1

    Title: Crack VB 2611 Salts
    Author: A1131
    URL: Mega link
    Description: Simple script to save time on files operations.

    Amateur of mycology and hashcracking | 1x3060Ti | 1x1050Ti
    PGP:4B0A386530D789157435DC7489138FB52FDD7FC1

    1 Reply Last reply
    0
    • A1131A Offline
      A1131A Offline
      A1131
      Trusted
      wrote last edited by
      #2
      #!/bin/bash
      
      # simple script to save your time on file operations while cracking vBulletin < 3.8.5 hashes without salts using hashcat
      # popular types of vBulletin salt - ?a?a?a, ?h?h?h?h?h?h, ?d?d?d?d?d
      # download hashgen - https://github.com/cyclone-github/hashgen (used to convert $[HEX] hashes with colon-containing salts and generating hashed wordlist)
      
      # Function to read file paths with validation
      read_file_path() {
          local prompt="$1"
          local result_var="$2"
          local path
          while true; do
              read -r -p "$prompt" path
              if [ -f "$path" ]; then
                  # Use eval to set the variable passed by name
                  eval "$result_var=\"$path\""
                  break
              else
                  echo "ERROR: File not found: $path. Please try again."
              fi
          done
      }
      
      echo "--- Interactive vBulletin Salt Cracker Configuration ---"
      
      # --- Input Acquisition ---
      
      # 1. Hash list path
      read_file_path "Enter the path to the hash list (e.g., hashlists/main.txt): " HASHLIST_PATH
      
      # 2. Wordlist path
      read_file_path "Enter the path to the wordlist (e.g., wordlists/top1000.txt): " WORDLIST_PATH
      
      # 3. Mask (optional, with default value)
      read -r -p "Enter the mask for salt cracking (e.g., ?h?h?h?h?h?h) [Default: ?a?a?a]: " CRACKING_MASK
      if [ -z "$CRACKING_MASK" ]; then
          CRACKING_MASK="?a?a?a"
      fi
      
      # Generate dynamic paths
      WORDLIST_BASENAME=$(basename "$WORDLIST_PATH")
      HASHED_WORDLIST_PATH="md5_wordlists/${WORDLIST_BASENAME}.md5"
      
      echo "--- Settings Confirmed ---"
      echo "Hash List: $HASHLIST_PATH"
      echo "Word List: $WORDLIST_PATH"
      echo "Mask: $CRACKING_MASK"
      echo "Hashed Word List Output: $HASHED_WORDLIST_PATH"
      echo "------------------------------"
      sleep 2s
      
      # --- Tool Verification ---
      if ! command -v hashcat &> /dev/null; then
          echo "ERROR: hashcat not found. Ensure it is in your PATH."
          exit 1
      fi
      if [ ! -f ./hashgen ]; then
          echo "ERROR: The ./hashgen file was not found. Ensure it is in the current directory and is executable."
          exit 1
      fi
      
      # --- STEP 1: Potfile Cleanup ---
      echo "--- STEP 1: Cleaning potfile ---"
      if [ -f "hashed.pot" ]; then
          echo "Creating backup: hashed.pot -> hashed.pot.bak"
          cat hashed.pot >> hashed.pot.bak 2>/dev/null
      else
          echo "hashed.pot not found, skipping backup."
      fi
      echo '' > hashed.pot
      sleep 3s
      
      # --- STEP 2: Generate Hashed Wordlist ---
      echo "--- STEP 2: Generating hashed wordlist ---"
      mkdir -p md5_wordlists
      ./hashgen -m 0 -w "$WORDLIST_PATH" -o "$HASHED_WORDLIST_PATH"
      sleep 3s
      
      # --- STEP 3: Crack Salts ---
      echo "--- STEP 3: Cracking salts (Mode -m0 -a6) ---"
      hashcat -d1 -m0 -a6 -w4 --hwmon-temp-abort=95 --potfile-path=hashed.pot "$HASHLIST_PATH" "$HASHED_WORDLIST_PATH" "$CRACKING_MASK" --remove
      sleep 3s
      
      # --- STEP 4: Prepare Hashes for Wordlist Cracking ---
      echo "--- STEP 4: Preparing hashes for cracking (m2611 format) ---"
      sleep 3s
      
      # 1. Process NON-HEX lines (already cracked passwords)
      # Corrected format: HASH:PLAINTEXT (Single colon)
      grep -v HEX hashed.pot | sed 's/^\(.\{65\}\)/\1:/' | cut -d: -f1,3 | sed -E 's/^(.{32}):(.*)$/\1:\2/' > 2611_to_crack.txt
      sleep 3s
      
      echo "Converting HEX strings"
      # 2. Convert HEX strings
      grep HEX hashed.pot | cut -d: -f2 > hex.tmp
      grep HEX hashed.pot | cut -d: -f1 > hash.txt
      ./hashgen -m plaintext -w hex.tmp -o hex.txt
      sleep 3s
      
      # 3. Combine HEX hashes and append to 2611_to_crack.txt
      # Corrected format: HASH:HEX_SALT (Single colon)
      paste -d : hash.txt hex.txt | sed -E 's/^(.{32}):(.*)$/\1:\2/' >> 2611_to_crack.txt
      sleep 3s
      
      echo "Deleting temporary files"
      # 4. Remove temporary files
      rm -f ./{hash.txt,hex.txt,hex.tmp}
      sleep 3s
      
      # --- STEP 5: Crack Hashes with Wordlist (Mode -m2611) ---
      echo "--- STEP 5: Cracking hashes with wordlist -a0 -m2611 ---"
      hashcat -d1 -m2611 -a0 -w4 --potfile-path=hashcat.pot.salted 2611_to_crack.txt "$WORDLIST_PATH"
      sleep 3s
      
      # --- STEP 6: Export Cracked Hashes ---
      echo "--- STEP 6: Writing/Appending last cracked hashes into file ---"
      hashcat -d1 -m2611 -a0 -w4 -O --hwmon-temp-abort=95 --hwmon-disable --potfile-path=hashcat.pot.salted 2611_to_crack.txt --show > 2611_cracked.txt
      sleep 3s
      
      echo "Done."
      
      

      Preview

      Amateur of mycology and hashcracking | 1x3060Ti | 1x1050Ti
      PGP:4B0A386530D789157435DC7489138FB52FDD7FC1

      1 Reply Last reply
      0
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      Who's Online [Full List]

      8 users active right now (3 members and 5 guests).
      cyclone, hashpwn-bot

      Board Statistics

      Our members have made a total of 4.3k posts in 151 topics.
      We currently have 266 members registered.
      Please welcome our newest member, foxxysecurenet.
      The most users online at one time was 49 on Thursday, December 26, 2024.

      • Login

      • Don't have an account? Register

      • Login or register to search.
      • First post
        Last post
      0
      • Categories
      • Recent