![]() |
أرجووووووووووووووكم أخي أرجووووووووووووووكم فكو لي تفشير الكود أرجوووووكم لا تقلو لي لا أرجووووكم ضروري جدددددددددا d74cc509a1754ce7412e71e7fd9d91bd |
[align=center]اسف اخي (نوتفوند) بس انا ارسلته للداتابايز و ان شاء الله يرد[/align] |
md4 hash |
الهاش md4 استخدم برنامج Password pro |
استخدم تدات لفك التشفير ~ Info ************************************************** ************** *** MD4/MD5/SHA1 GPU Password Recovery v0.70.48.4 *** *** For ATI RV 7X0 cards and nVidia 'CUDA' ones (G80+) *** *** (c) 2009-2010 Ivan Golubev, http://golubev.com *** *** see "readme.htm" for more details *** ************************************************** ************** *** Any commercial use of this program is strictly forbidden *** ************************************************** ************** Found 2 CAL device(s) Found 1 CUDA device(s) Starting brute-force attack, Charset Len = 36, Min passlen = 4, Max passlen = 7 Charset (unicode -> 0) [abcdefghijklmnopqrstuvwxyz0123456789] Charset in HEX: 61 62 63 64 65 66 67 68 69 6a 6b 6c 6d 6e 6f 70 71 72 73 74 75 76 77 78 79 7a 30 31 32 33 34 35 36 37 38 39 Starting from [aaaa] Hash type: MD5, Hash: cbe1d6d5800ec1e03a5f2a64882a0d41 We're running at ATI and NVIDIA GPUs simultaneously. It isn't that common situation, so some issues possible. Device #0: [RV830] 850.00 Mhz 800 SP Device #1: [RV7x0] 750.00 Mhz 640 SP Device #2: [GeForce 8600 GT] 1188.00 Mhz 32 SP Hardware monitoring disabled. CURPWD: 66owsnc DONE: 51.02% ETA: 13s CURSPD: 2756.0M=1646.0M+1017.4M+92.6M Found password: [roger15], HEX: 72 6f 67 65 72 31 35 Processed 42 228 252 672 passwords in 16s. Thus, 2 731 452 307 password(s) per second in average. ----------------------------------------------------------- >> لتحميل =مــن هنا |
الساعة الآن 08:09 AM |
[ vBspiders.Com Network ]