Need a md5 password from 100k. Only hashes without logins and other data. The safety study?


Warning: count(): Parameter must be an array or an object that implements Countable in /home/styllloz/public_html/qa-theme/donut-theme/qa-donut-layer.php on line 274
0 like 0 dislike
8 views
In the process of analyzing a security of the same engine found in the database are md5 and unsalted have an idea regarding how you can not very expensive to decode a certain percentage of the base. For the experiment needs a base of unsalted md5 hashes of user passwords any site. Interested in just the hashes and nothing more. The results will be published on Habre. I myself am such a basis do not have. Someone tell me where to download leaked base someone's old, 5-10 years old. Or who are willing to provide their data for the experiment(in a row if anyone will go for it but all the same.)
by | 8 views

6 Answers

0 like 0 dislike
But if one were to take the base the most popular passwords and sahacharadi card password, and use these hashes?
Base, we've got a long time ago. There to 1 million Dating.
by
0 like 0 dislike
I remember in 2009 on the Internet roamed the list of logins/passwords of Facebook...
For evil purposes, it is hardly suitable, but for research — completely.
by
0 like 0 dislike
by
0 like 0 dislike
select count (*) as cnt, hash from users
group by hash
order by cnt desc
\r

Type so (sorry for t-sql)
At the forefront will be contenders for fast selection in the dictionary.
by
0 like 0 dislike
Sorry for offtopic, but what do you mean "unsalted"?
by
0 like 0 dislike
Add salt on top :)
by

Related questions

0 like 0 dislike
1 answer
0 like 0 dislike
7 answers
0 like 0 dislike
1 answer
0 like 0 dislike
4 answers
0 like 0 dislike
1 answer
110,608 questions
257,186 answers
0 comments
27,994 users