Leaks 270M Wattpad.com Parsed & Cleaned Database Dump Leaked!

25
Posts
43
Likes

kpzthenight


Level ( I )
The SHA-1 hash of:
1151 is:



You can attempt to reverse the SHA-1 hash which was just generated, to reverse it
I'm sorry, i made a typo and i couldn't post more messages. Hashes.com said it was hash type 1451 (not 1151) and the plaintext of the hash I sent was 010203.
Hashes.com hash identification in expert mode says that possible algorithms could be:
sha256($plaintext.$salt)
sha256($salt.$plaintext)
HMAC-SHA256 (key = $plaintext)
HMAC-SHA256 (key = $salt), sha256(sha256($plaintext).$salt)
sha256($salt.$plaintext.$salt)
HMACSHA256($plaintext)

Some of the algorithms above do not appear on hashcat wiki, and I think I have tested all the ones that appear there, but I will test again just in case.
 
1,061
Posts
8,970
Likes

mightydawn


Staff member
Administrator
Moderator
Level ( I )
I'm sorry, i made a typo and i couldn't post more messages. Hashes.com said it was hash type 1451 (not 1151) and the plaintext of the hash I sent was 010203.
Hashes.com hash identification in expert mode says that possible algorithms could be:
sha256($plaintext.$salt)
sha256($salt.$plaintext)
HMAC-SHA256 (key = $plaintext)
HMAC-SHA256 (key = $salt), sha256(sha256($plaintext).$salt)
sha256($salt.$plaintext.$salt)
HMACSHA256($plaintext)

Some of the algorithms above do not appear on hashcat wiki, and I think I have tested all the ones that appear there, but I will test again just in case.
ok, test it and update in topic.
 
25
Posts
43
Likes

kpzthenight


Level ( I )
Of all the hash, the part that seems more intriguing is "d2e1a4c569e7018cc142e9cce755a964bd9b193d2d31f02d80bb589c959afd7e".
It appears on all the wattpad hashes that i have checked of the Wattpad database in hashes.com, so I suspect it is a fixed salt. (That could mean the hash is sha256($salt.$plaintext.$salt), as stated in the post above).
I have tried sha2-256 along with all of its variants in hashcat.
 
1,061
Posts
8,970
Likes

mightydawn


Staff member
Administrator
Moderator
Level ( I )
Of all the hash, the part that seems more intriguing is "d2e1a4c569e7018cc142e9cce755a964bd9b193d2d31f02d80bb589c959afd7e".
It appears on all the wattpad hashes that i have checked of the Wattpad database in hashes.com, so I suspect it is a fixed salt. (That could mean the hash is sha256($salt.$plaintext.$salt), as stated in the post above).
I have tried sha2-256 along with all of its variants in hashcat.
still not appeared?
 
1,061
Posts
8,970
Likes

mightydawn


Staff member
Administrator
Moderator
Level ( I )
Of all the hash, the part that seems more intriguing is "d2e1a4c569e7018cc142e9cce755a964bd9b193d2d31f02d80bb589c959afd7e".
It appears on all the wattpad hashes that i have checked of the Wattpad database in hashes.com, so I suspect it is a fixed salt. (That could mean the hash is sha256($salt.$plaintext.$salt), as stated in the post above).
I have tried sha2-256 along with all of its variants in hashcat.
bcrypt hashes?
 
25
Posts
43
Likes

kpzthenight


Level ( I )
Hey, I have an Update. I asked in Hashes.com discord server and wattpad algorithm is [HMAC_sha256(sha1(id):password, secret)].
So in hashcat it would be mode 1460 with the hash being [hash:d2e1a4c569e7018cc142e9cce755a964bd9b193d2d31f02d80bb589c959afd7e] (its the same in all hashes)
and the password candidate would be sha1(id)+password. In this case by "+" I mean that sha1(id) is put before the mask in a bruteforce attack or before the wordlist in a dictionary attack
 
25
Posts
43
Likes

kpzthenight


Level ( I )
Hello, the download link doesn't work anymore. By the way, great work, I've tried cleaning the file by myself (I downloaded the full version in other forum some months ago) and it's been a pain in the butt, so thanks for cleaning it and sharing.
 
1,061
Posts
8,970
Likes

mightydawn


Staff member
Administrator
Moderator
Level ( I )
Hey, I have an Update. I asked in Hashes.com discord server and wattpad algorithm is [HMAC_sha256(sha1(id):password, secret)].
So in hashcat it would be mode 1460 with the hash being [hash:d2e1a4c569e7018cc142e9cce755a964bd9b193d2d31f02d80bb589c959afd7e] (its the same in all hashes)
and the password candidate would be sha1(id)+password. In this case by "+" I mean that sha1(id) is put before the mask in a bruteforce attack or before the wordlist in a dictionary attack
i see never cracked wattpad hash before.
 
1,061
Posts
8,970
Likes

mightydawn


Staff member
Administrator
Moderator
Level ( I )
Hello, the download link doesn't work anymore. By the way, great work, I've tried cleaning the file by myself (I downloaded the full version in other forum some months ago) and it's been a pain in the butt, so thanks for cleaning it and sharing.
yes its dead topic for now, cleaning full is true pain, but sorry i dont have file :censored:
 
Top