exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ipb_cracker.txt

ipb_cracker.txt
Posted Nov 14, 2008
Authored by 0x90

Invision Power Board Cracker version 1.0. This tool bruteforces md5 hashes and was written for use on FreeBSD.

tags | cracker
systems | freebsd
SHA-256 | 3d99cd304a1fff660b0713de817ddfc3a7619ff26cb6fff92bdf0ca2e8ece2d0

ipb_cracker.txt

Change Mirror Download
#!/usr/bin/env bash
# InvisionPowerBoard Cracker V1.0
# coded By 0x90 2008
# 0x90[at]bsdmail.org
# This small tool will bruteForce "Invision Power Board" MD5 hash
# work only on FreeBSD
#
# I do not take any reponsibilty for what you do with this tool
# Hopefully it will make your life easier rather then making other
# peoples lives more difficult!
##############################
# ___ ___ ___
# / _ \ / _ \ / _ \
#| | | |_ _| (_) | | | |
#| | | \ \/ /\__, | | | |
#| |_| |> < / /| |_| |
# \___//_/\_\ /_/ \___/
##############################

echo ".:: InvisionPowerBoard Cracker, Coded By 0x90 ::."
echo -n "Enter IPB md5 Hash: "
read hash
if [ -z "$hash" ] || [ "${#hash}" != "32" ]; then
echo "Error: please Enter a valid md5 hash"
exit
fi
echo
echo -n "Enter IPB Salt: "
read salt
md5_salt=`md5 -q -s "$salt"`

echo -n "Select BruteForce Method:
1: Random BruteForce
2: Dictionary BruteForce
Enter your choise 1 or 2: "
read choise
if [ -z "$choise" ] || [ "$choise" != "1" ] && [ "$choise" != "2" ]; then
echo "Error: please choise between 1 or 2"
exit 1
fi
#########################
# Random BruteForce
#########################

if [ "$choise" == "1" ]; then
echo "use Random method to crack"
echo "trying to bruteforce IPB MD5 hash ..."

echo -n "enter min lengh: "
read minlen
echo -n "enter max lengh: "
read maxlen

echo -n "Select bruteForce mode:
all, alnum, lower, upper, digit, alpha, symbols
> "
read mode

if [ "$mode" = "all" ]; then
char="a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 ! # \$ % & \' ( ) \* + , -
. / : ; & < = > ? @ [ \\ ] ^ _ { | } ~"
fi
if [ "$mode" = "alnum" ]; then
char="a b c d e f g h i j k l m n o p q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9"
fi
if [ "$mode" = "alpha" ]; then
char="a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9"
fi
if [ "$mode" = "lower" ]; then
char="a b c d e f g h i j k l m n o p q r s t u v w x y z"
fi
if [ "$mode" = "upper" ]; then
char="A B C D E F G H I J K L M N O P Q R S T U V W X Y Z"
fi
if [ "$mode" = "digit" ]; then
char="0 1 2 3 4 5 6 7 8 9"
fi
if [ "$mode" = "symbols" ]; then
char="! # \$ % & \' ( ) \* + , - . / : ; & < = > ? @ [ \\ ] ^ _ { | } ~"
fi


bf(){
for c in $char ; do

nc=$[$nc+1]
ch[$nc]=$c
done
for x in `jot - 1 $[$maxlen+1]` ; do

if [ $minlen -ge $x ] ; then
ci[$x]=1
else
ci[$x]=0
fi
done
for clen in `jot - $minlen $maxlen` ; do

while [ ${ci[$[$clen+1]]} -ne 1 ] ; do
wrd=""
for x in `jot - $clen 1` ; do
wrd=$wrd${ch[${ci[$x]}]}
done

md5_hash=`md5 -q -s "$wrd"`
ipb_bf=`md5 -q -s "$md5_salt$md5_hash"`


echo "$wrd: hash: $ipb_bf"
if [ "$ipb_bf" == "$hash" ]; then
echo
echo "Cracked, IPB md5 password is: $wrd"
exit 0
fi
ci[1]=$[${ci[1]}+1]
for x in `jot - 1 $clen`; do
if [ ${ci[$x]} -gt $nc ] ; then
ci[$x]=1
ci[$[$x+1]]=$[${ci[$[$x+1]]}+1]
fi
done
done
done
}

bf



fi
#########################
# Dictionary BruteForce
#########################
# Cain&Abel wordlist http://www.md5this.com/Wordlist.zip
# dont forget to convert the wordlist to Unix file format
# dos2unix Wordlist.txt
if [ "$choise" == "2" ]; then
echo "use dictionary method to crack"
echo -n "Enter dictionary name: "
read dic
echo "trying to bruteforce IPB MD5 hash ..."

n=`cat $dic | wc -l`

echo "we have $n password to try"
for (( i=1; i <= $n; i++));
do
pass=`sed -n "$i"p $dic`

md5_hash=`md5 -q -s "$pass"`
ipb_bf=`md5 -q -s "$md5_salt$md5_hash"`

echo "$i: hash: $ipb_bf"

if [ "$ipb_bf" == "$hash" ]; then
echo
echo "Cracked, IPB md5 password is: $pass"
exit 0
fi
done
fi
exit
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close