عرض مشاركة واحدة
قديم 06-04-2010, 02:38 AM   رقم المشاركة : 5 (permalink)
معلومات العضو
Governmen7
 
الصورة الرمزية Governmen7
 

 

 
إحصائية العضو






Governmen7 غير متواجد حالياً

 

 

إحصائية الترشيح

عدد النقاط : 10
Governmen7 is on a distinguished road

افتراضي


استخدم تدات لفك التشفير ~ Info

************************************************** **************
*** MD4/MD5/SHA1 GPU Password Recovery v0.70.48.4 ***
*** For ATI RV 7X0 cards and nVidia 'CUDA' ones (G80+) ***
*** (c) 2009-2010 Ivan Golubev, http://golubev.com ***
*** see "readme.htm" for more details ***
************************************************** **************
*** Any commercial use of this program is strictly forbidden ***
************************************************** **************

Found 2 CAL device(s)

Found 1 CUDA device(s)
Starting brute-force attack, Charset Len = 36, Min passlen = 4, Max passlen = 7
Charset (unicode -> 0) [abcdefghijklmnopqrstuvwxyz0123456789]
Charset in HEX: 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 30 31 32 33 34 35
36 37 38 39
Starting from [aaaa]
Hash type: MD5, Hash: cbe1d6d5800ec1e03a5f2a64882a0d41
We're running at ATI and NVIDIA GPUs simultaneously. It isn't that common situation, so some issues possible.
Device #0: [RV830] 850.00 Mhz 800 SP
Device #1: [RV7x0] 750.00 Mhz 640 SP
Device #2: [GeForce 8600 GT] 1188.00 Mhz 32 SP
Hardware monitoring disabled.
CURPWD: 66owsnc DONE: 51.02% ETA: 13s CURSPD: 2756.0M=1646.0M+1017.4M+92.6M
Found password: [roger15], HEX: 72 6f 67 65 72 31 35
Processed 42 228 252 672 passwords in 16s.
Thus, 2 731 452 307 password(s) per second in average.
-----------------------------------------------------------

>> لتحميل =مــن هنا

التوقيع

D0NT L34RN TO HACK ; HACK TO LEARN

That there is no possibility of this user is traveling abroad

7koma Previously & Now Governmen7

mvx@7koma.com
Or
HTT@HOTMAIL.FR

THE END


 


التعديل الأخير تم بواسطة Governmen7 ; 06-04-2010 الساعة 02:53 AM.

   

رد مع اقتباس