Stella

Members
  • Content Count

    16
  • Last visited

Community Reputation

1 Neutral

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. I'm looking for verified eune accounts that are low elo (between Iron 4 to Bronze 3). Inactive for at least 2 months. Or bronze last season (s8) and unranked s9.
  2. I have a forum with registered user list and need to scrape specific data for each user: - username - post count - forum rank There's 3000 pages to scrape, need someone that has experience in this to scrape this shit for me, write a python script/tool or whatever. Discord - Stella#6599
  3. Restocked 10 codes, price 0.8$/each Enjoy
  4. No vouches, already sold 100 codes today. Restocked 37 codes now, price upped to 2$ :hype:
  5. [align=center] Thread updated, all codes checked and working fine. Warranty: 30 minutes after purchase https://selly.gg/u/StellaV GB - 4$/each FR - 2.5$/each CA - 2$/each AU - 0.8$/each Discord - Stella#6599 Join my discord for notifications about restocks: https://discord.gg/QnYCWxd [/align]
  6. Looking to purchase a lot of malwarebyte keys, the ones that people generated recently with fusionfire or whatever else was around. Need a lot of them, offer price on DMs or Discord - Stella#6599
  7. How the fuck is this site so raped. I checked 4 different private proxy providors, 100$/200$ plans. Residential proxies with huge pools and rotating requests, nothing works lol.
  8. I dont get exactly what you are supposed to do after searching the hashes posted on the forum. What do you mean? Everything is explained in the guide, you crack the hashes for people and post them on the thread to receive the payment...
  9. :monkas: DONT BE A LEECHER :monkas: Another tutorial, this time it will be a newbie friendly guide on how to use hashcat to decrypt various types of hashes. If you have zero clue on how to start, this is a good place for you. Lets get started! [hide] Introduction Decrypting passwords with hashcat is really easy if you know the commands, after reading this guide you will be able to do basic decrypting of any hash supported by hashcat. I will attempt to explain everything in details and in a way that a complete newbie to hashcat can understand. Guide 1. HashFinder Before you start attempting to decrypt your hashes with hashcat, you should run all your hashes through a HashFinder. It's a website that's connected to a huge database of cracked hashes, you should go -here- and paste all your hashes into the box, then click Search Hashes. You can only put 25.000 hashes at a time, so if you are decrypting a lot more than that you should download their client in the top corner, it's a paid tool that costs 1$ per 500k hashes, but is so worth it. Keep in mind you have to put in just the hash, or hash:salt without usernames. Some hashes may pop up as Private, that means you need to download the paid client to get them. HashFinder will most likely find a big part of hashes you want to decrypt, copy the results into a new text file and proceed to step 2. HashFinder is also a good way to quickly identify a hash, if it finds results it's gonna tell you what type of hash is that. 2. Hashcat - Downloading First you need to download hashcat, you can get the newest version here: -link- Unpack hashcat and in the folder with all the files, create 3 things: - Encrypted.txt - Decrypted.txt - wordlist folder 3. Hashcat - Preparing Now copy all of your hashes you want to decrypt into Decrypted.txt and save the file You also want to download some high quality wordlists, that you will put into the "wordlist" folder. At the beginning i mentioned to use HashFinder and copy the results into a new text file, now is the time you want to grab that text file. You want to go to your hashcat folder and find a file named hashcat.potfile and once you find it, open it with notepad. Simply copy paste the results you found on HashFinder into hashcat.potfile and save the file. Hashcat.potfile is like a small hash database of your Hashcat, before it starts checking your wordlists, it will first check if any of the hashes are in the potfile. If they are, then they will be automatically marked as cracked and this will greatly increase speed/efficiency. Optional Step If the hash you are cracking is one of the heavy/hard ones, you may want to create a custom wordlist, full of words that target specifically that database. For example, if you are trying to decrypt a database of a private server of RuneScape, there is a high possibility passwords are gonna be related to runescape. You can try looking for other RS databases that are already decrypted and copy their usernames/passwords to create a wordlist, or you can use wordlist creator tools to make your own one. If you don't feel like playing with all that, you can just download some high quality wordlists, ones i can definitely recommend are: - HashKiller Dictionary -link- - WeakPass (sort by rating) -link- Once you download the wordlists, you gotta put them into the "wordlist" folder that you previously created. 4. Hashcat - Running Now click Windows Key on your keyboard and write "cmd" then click enter to open command prompt. In the command prompt write "cd", then click space and then grab the folder of Hashcat into cmd prompt. Click enter. Now that we are in hashcat directory in the command prompt, we are ready to run hashcat and decrypt passwords. I'm gonna assume you already identified the hash type you are trying to decrypt. If you haven't then go back to HashFinder step, or use a web hash identify tool (plenty of them). At the very bottom of this post, you will find a spoiler with all hashcat modes, find the mode number responsible for the hash you are trying to decrypt. Now that you have the mode number, we can run hashcat and start decrypting. This is what i'm about to write into the cmd prompt, lets break it down so you understand what's going on. hashcat64.exe -w 3 -m 100 --username Encrypted.txt wordlist hashcat64.exe -> We are talking to hashcat64.exe -w 3 -> This means we are running hashcat in a 3rd workload profile It's responsible for cracking speed, the number goes up to 4 and the higher it goes the more strain it puts on your GPU/CPU. -m 100 -> This means we are running hashcat in mode 100, which is SHA1 hash mode. Once again, all modes are listed in the spoiler on the bottom of this post. Change it to mode of your hash. --username -> This means we are decrypting hashes that have username in front of them. If your hashes in Encrypted.txt don't have usernames, you should remove this. Encrypted.txt -> We are telling hashcat to decrypt hashes that are in Encrypted.txt wordlist -> We are telling hashcat to use wordlists that are in folder "wordlist" to decrypt the hashes. Now that you know what each thing means, you can pretty much just copy the command i wrote above, and adjust it so it suits you. For example lets say you don't have usernames, and you are checking vBulletin long salt which is mode -m 2711. You would want to remove the --username and change the mode, so your command would look like this. hashcat64.exe -w 3 -m 2711 Encrypted.txt wordlist Alright, you have started your hashcat and it's decrypting passwords. Congrats. 5. Hashcat - Saving After your hashcat finishes checking all wordlists, you want to do two things. One is to generate a text file with hashes that have been cracked, you can do that by using command hashcat64.exe -m 100 --username --show Encrypted.txt --outfile-format=2 -o Decrypted.txt In my case i was cracking hashes that had usernames in front of them, so this command will give me a username:cracked hash result. So pretty much a username:password combolist, which i can save and use later. That's all great but now you want to do the second thing i was talking about, which is saving the left file. This command will generate a text file with only hashes that haven't been cracked. hashcat64.exe -m 100 --username --left Encrypted.txt --outfile-format=1 -o LeftHashes.txt 6. Hashcat - Problems "Token length exception" - You have chosen the wrong mode. "Seperator unmatched" - You have chosen the wrong mode. Sometimes salt of your hash can be hexed if it has special symbols. Then you need to add to your command --hex-salt vBulletin If you are cracking vBulletin hashes, and you parsed the database yourself then there is a high chance you haven't removed escape characters. If you haven't, then a lot of your hashes are incorrect and therefore you will not be able to crack them. I will write a short guide on how to fix this on Linux later, link will be -> HERE <- 7. Hashcat - Paying We arrived at the end of my tutorial, you should by now understand the basics of hashcat. This tutorial is more than enough to decrypt hashes on your own, but it doesn't change the fact you are still a newbie. If you really care about decrypting your hashes, you can always head to websites like hashkiller. Go to paid password recovery and you can post your hash list there, set the price and have people that do it for a living, decrypt hashes for you. People there have their own set-ups, gears with 16-32 GPU and clouds full of wordlists. If you pay well, you can easily decrypt most of your hashes. It's still a good idea to first do what you can on your own, and then when you run out of options consider paid recovery. Hash Modes Below list of all hash modes, identify the hash you are cracking and CTRL+F to find the right mode number. [/hide] Spent almost 2 hours writing this guide, hope you appreciate and enjoy! :hype:
  10. DONT BE A LEECHER This method was something i did for a few weeks back in the day, and it still works. Zero effort money, literally. If you appreciate the method, leave a like. I plan posting a lot more of HQ content. [hide] 1. Go to https://forum.hashkiller.co.uk/ and register an account 2. Go to Paid Password Recovery section on the forum https://forum.hashkiller.co.uk/forum-view.aspx?f=20 3. You should pin that tab so you keep it around because your job is to refresh that page every now and then to see if any new thread pops up 4. People will be posting threads where they pay for cracking hashes, once a new one pops up you want to go to these two websites: https://hashes.org/search.php http://finder.insidepro.team/ And paste the hashes they are looking for, click search. Those sites are connected to huge databases with billions of cracked hashes, if the person posting the thread haven't used them before posting, you will get hits. From experience i can tell you that most of the time they don't use those sites. Most of the time it's easy 5-10$ per thread, sometimes you can stumble upon a thread you will make 50$~ from. You won't make crazy money from this, but when i used to do it for 3 weeks i managed to get 450$. The advantage is that this method requires close to zero effort, so you can combine it with a few others and make few grands per month. Good luck! [/hide]
  11. Works great, just bans proxies super hard. All my fineproxies dead after 10 minutes of checking on 500 threads.
  12. Maybe still works, appreciate the leak.