what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Multi CMS Hash Cracker 0.1

Multi CMS Hash Cracker 0.1
Posted Jun 16, 2011
Authored by localh0t

Multi CMS Hash Cracker is a perl script for cracking hashes from various CMS systems.

tags | cracker, perl
SHA-256 | c8ef2a848e623be520d60450ae435c291741b5ab8bf93f8e310159519d1e80b4

Multi CMS Hash Cracker 0.1

Change Mirror Download
#!usr/bin/perl
use Digest::MD5 qw(md5_hex);
use Digest::SHA1 qw(sha1_hex);

# Author: localh0t
# Date: 09/06/11
# Contact: mattdch0@gmail.com
# Follow: @mattdch

# Help

if(!$ARGV[7])
{
print "\n\n###########################################";
print "\n# Multi CMS Hash Cracker v0.1 by localh0t #";
print "\n###########################################";
print "\n\nUse: perl $0 -d [WORLDLIST FOLDER] -h [MD5 | SHA-1 HASH] -s [SALT | USERNAME] -c [CMS]\n";
print "Example: perl $0 -d /home/localh0t/wordlists/ -h caef8544a8e65e23f67ab844d4866e8d -s uZ*qX -c IPB\n";
print "Example: perl $0 -d /home/localh0t/wordlists/ -h dc4a27b25e3f780b89c165f931d6f85d5bd6e33e -s Administrator -c SMF\n\n";
print "Note: Worlists must end with .txt or .lst (or any extension)\n\n";
print "Support:\n========\n";
print "VB : md5_hex(md5_hex(password).salt) | (vBulletin)\n";
print "SMF : sha1_hex(user.password) | (Simple Machines Forum)\n";
print "IPB : md5_hex(md5_hex(salt).md5_hex(password)) | (Invision Power Board)\n";
print "JOOMLA : md5_hex(password.salt) | (Joomla 1.x)\n\n";
exit(0);
}


# Functions

sub ipb_cracker{
my $hash = shift;
my $salt = shift;
my $dir = shift;
foreach $file (@FILES) {
open(DICT,"<".$dir.$file) || die "\n[-] Error opening $file\n\n";
print "[!] Using $file...\n";
foreach $password(<DICT>) {
$password=~s/\s|\n//;
chomp($password);
$cracked = md5_hex(md5_hex($salt).md5_hex($password));
if ($cracked eq $hash) {
return "[+] Hash cracked !: $password\n\n";
}
}
print "[!] Nothing found with $file...\n\n";
}
return "\n[-] Password not found\n\n";
}

sub vb_cracker{
my $hash = shift;
my $salt = shift;
my $dir = shift;
foreach $file (@FILES) {
open(DICT,"<".$dir.$file) || die "\n[-] Error opening $file\n\n";
print "[!] Using $file...\n";
foreach $password(<DICT>) {
$password=~s/\s|\n//;
chomp($password);
$cracked = md5_hex(md5_hex($password).$salt);
if ($cracked eq $hash) {
return "[+] Hash cracked !: $password\n\n";
}
}
print "[!] Nothing found with $file...\n\n";
}
return "\n[-] Password not found\n\n";
}

sub smf_cracker{
my $hash = shift;
my $user = shift;
my $dir = shift;
foreach $file (@FILES) {
open(DICT,"<".$dir.$file) || die "\n[-] Error opening $file\n\n";
print "[!] Using $file...\n";
foreach $password(<DICT>) {
$password=~s/\s|\n//;
chomp($password);
$cracked = sha1_hex($user.$password);
if ($cracked eq $hash) {
return "[+] Hash cracked !: $password\n\n";
}
}
print "[!] Nothing found with $file...\n\n";
}
return "\n[-] Password not found\n\n";
}

sub joomla_cracker{
my $hash = shift;
my $salt = shift;
my $dir = shift;
foreach $file (@FILES) {
open(DICT,"<".$dir.$file) || die "\n[-] Error opening $file\n\n";
print "[!] Using $file...\n";
foreach $password(<DICT>) {
$password=~s/\s|\n//;
chomp($password);
$cracked = md5_hex($password.$salt);
if ($cracked eq $hash) {
return "[+] Hash cracked !: $password\n\n";
}
}
print "[!] Nothing found with $file...\n\n";
}
return "\n[-] Password not found\n\n";
}

my ($dir, $hash, $salt, $cms, $arg);

foreach $loop (@ARGV) {
for ($loop) {
/^-d$/ and do { $dir = $ARGV[($arg+1)]; last; };
/^-h$/ and do { $hash = $ARGV[($arg+1)]; last; };
/^-s$/ and do { $salt = $ARGV[($arg+1)]; last; };
/^-c$/ and do { $cms = $ARGV[($arg+1)]; last; };
}
$arg++;
}


# Main

print "\n[!] Cracking $hash with $salt as username/salt...\n\n";

opendir(DIR, $dir) || die "\n[-] Folder not found\n\n";

while($file = readdir(DIR)) {
if ($file ne '.' and $file ne '..') {
$FILES[$clean] = $file;
$clean++;
}
}

for ($cms) {
/^IPB$/ and do { $result = &ipb_cracker($hash,$salt,$dir); last; };
/^VB$/ and do { $result = &vb_cracker($hash,$salt,$dir); last; };
/^SMF$/ and do { $result = &smf_cracker($hash,$salt,$dir); last; };
/^JOOMLA$/ and do { $result = &joomla_cracker($hash,$salt,$dir); last; };
/^.$/ and do { print "[-] CMS not available\n"; exit(0); last; };
}

print $result;

# Exit

close(DICT);
closedir(DIR);
exit(0);

__END__
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close