1. Внимание!!! Не заходит на форум? Хотите сохранить доступность к нам на 99.9%? Обязательно запишите все зеркала проекта! Именно по этому мы настоятельно рекомендуем использовать онион домен для TOR-Браузера, там доступность форума будет максимальной. Ссылка для установки и все зеркала в этой темe.

    Зеркало для TOR-Браузера - http://norabizt5qqxefxy.onion

    Чистое зеркало для обычных браузеров - https://nora.holiday

    Скрыть объявление

Брут сложных hash с дидиков и ssh

Тема в разделе "КРИПТОГРАФИЯ", создана пользователем Maestro, 17 янв 2017.

  1. Maestro
    off

    Maestro Команда MrROBOT СПЕЦИАЛИСТ

    Сообщения:
    32
    Пол:
    Мужской
    Репутация:
    14
    Брут сложных hash с дидиков и ssh

    Доброе утро форумчани и снова кейс от команды MrROBOT. В этой стать я расскажу как очень просто настроить профессиональный брутер HashCAT на дидик под win или linux (разницы никакой нет, все идентично). Эта тузла располагает 160+ Hash-types и очень гибкими настройками. На официальном сайте есть уже скомпилированная версия под любую OS, а так же исходники. Cкачал, перед запуском поставил OpenCL и в бой. Ssh пойдет с логов, дедики с брута. Распределил задание по серверам, собрал словарь, сделал различные макси и самые сложные хэши станут доступны.


    Пробудем в бою на Apache $apr1$ или как его еще называют MD5(APR):


    Очень часто у нас есть уязвимость чтение файлов на сервер и после брута директорий мы находим закрытую папку с помощью .htpasswd. В Моем случаи это будет MD5(APR).

    Список хэшей которые мне нужно сломать из .htpasswd:

    $apr1$K5aMQ1Kg$PUW3En1rz0kcKJAniCBE/.
    $apr1$PWMOU1A5$9S0PsF.9cGIJZzLcOS.WM/
    $apr1$no2RfFF.$Kq4W66ux2t7eKuvTmvVlk.
    $apr1$tdyjkQHl$9R27UWysCy9HIfy8
    $apr1$gUk6k.Un$itfSscs1FP5/mmsf1UvJq0

    hashcat.jpg

    Брутим hash по словорю популярных паролей:

    Код:
    C:\Users\Admin\Desktop\hashcat-3.30>hashcat64.exe -m 1600 -a 0 C:\Users\Admin\Desktop\hashcat-3.30\cracked.txt C:\Users\Admin\Desktop\hashcat-3.30\passwordslist.txt
    Разберем подробно эту команду:

    C:\Users\Admin\Desktop\hashcat-3.30>hashcat64.exe - Точный путь на дидике до тузлы.
    -m 1600 - Тут указываем функцию кэша, в нашем случаи MD5(APR) под номером 1600.
    -a 0 - Метод атаки.
    ыв
    C:\Users\Admin\Desktop\hashcat-3.30\cracked.txt - Путь до файла с хэшами.
    C:\Users\Admin\Desktop\hashcat-3.30\passwordslist.txt - Путь до словаря.

    Если нужен вывод в файл:

    Код:
    C:\Users\Admin\Desktop\hashcat-3.30>hashcat64.exe -m 1600 -a 0 C:\Users\Admin\Desktop\hashcat-3.30\cracked.txt C:\Users\Admin\Desktop\hashcat-3.30\passwordslist.txt -o C:\Users\Admin\Desktop\hashcat-3.30\cracked.txt C:\Users\Admin\Desktop\hashcat-3.30\result.xt
    Брутим по маске:

    ?l = abcdefghijklmnopqrstuvwxyz
    ?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ
    ?d = 0123456789
    ?s = !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~
    ?a = ?l?u?d?


    Код:
    C:\Users\Admin\Desktop\hashcat-3.30>hashcat64.exe -m 1600 -a 3 C:\Users\Admin\Desktop\hashcat-3.30\cracked.txt ?l?d?u?s?a
    Еще пример хитрой макси:

    Код:
    C:\Users\Admin\Desktop\hashcat-3.30>hashcat64.exe -m 1600 -a 3 C:\Users\Admin\Desktop\hashcat-3.30\cracked.txt admin?d?
    Результат:

    admin0
    admin1
    admin2
    admin3
    ...



    Хелп:

    Код:
    C:\Users\Admin\Desktop\hashcat-3.30>hashcat64.exe --help

    Официальный сайт:
    https://hashcat.net

    FAQ и WIKI:
    https://hashcat.net/wiki/

    Download:
    https://hashcat.net/hashcat/ - Есть скомпилированный вариант и в исходниках.

    Для работы необходим поставить пакет OpenCL:
    https://software.intel.com/en-us/articles/opencl-drivers#latest_windows_driver


    • MD4
    • MD5
    • Half MD5 (left, mid, right)
    • SHA1
    • SHA-224
    • SHA-256
    • SHA-384
    • SHA-512
    • SHA-3 (Keccak)
    • SipHash
    • RipeMD160
    • Whirlpool
    • DES (PT = $salt, key = $pass)
    • 3DES (PT = $salt, key = $pass)
    • GOST R 34.11-94
    • GOST R 34.11-2012 (Streebog) 256-bit
    • GOST R 34.11-2012 (Streebog) 512-bit
    • Double MD5
    • Double SHA1
    • md5($pass.$salt)
    • md5($salt.$pass)
    • md5(unicode($pass).$salt)
    • md5($salt.unicode($pass))
    • md5(sha1($pass))
    • md5($salt.md5($pass))
    • md5($salt.$pass.$salt)
    • md5(strtoupper(md5($pass)))
    • sha1($pass.$salt)
    • sha1($salt.$pass)
    • sha1(unicode($pass).$salt)
    • sha1($salt.unicode($pass))
    • sha1(md5($pass))
    • sha1($salt.$pass.$salt)
    • sha1(CX)
    • sha256($pass.$salt)
    • sha256($salt.$pass)
    • sha256(unicode($pass).$salt)
    • sha256($salt.unicode($pass))
    • sha512($pass.$salt)
    • sha512($salt.$pass)
    • sha512(unicode($pass).$salt)
    • sha512($salt.unicode($pass))
    • HMAC-MD5 (key = $pass)
    • HMAC-MD5 (key = $salt)
    • HMAC-SHA1 (key = $pass)
    • HMAC-SHA1 (key = $salt)
    • HMAC-SHA256 (key = $pass)
    • HMAC-SHA256 (key = $salt)
    • HMAC-SHA512 (key = $pass)
    • HMAC-SHA512 (key = $salt)
    • PBKDF2-HMAC-MD5
    • PBKDF2-HMAC-SHA1
    • PBKDF2-HMAC-SHA256
    • PBKDF2-HMAC-SHA512
    • MyBB
    • phpBB3
    • SMF
    • vBulletin
    • IPB
    • Woltlab Burning Board
    • osCommerce
    • xt:Commerce
    • PrestaShop
    • Mediawiki B type
    • Wordpress
    • Drupal
    • Joomla
    • PHPS
    • Django (SHA-1)
    • Django (PBKDF2-SHA256)
    • EPiServer
    • ColdFusion 10+
    • Apache MD5-APR
    • MySQL
    • PostgreSQL
    • MSSQL
    • Oracle H: Type (Oracle 7+)
    • Oracle S: Type (Oracle 11+)
    • Oracle T: Type (Oracle 12+)
    • Sybase
    • hMailServer
    • DNSSEC (NSEC3)
    • IKE-PSK
    • IPMI2 RAKP
    • iSCSI CHAP
    • Cram MD5
    • MySQL Challenge-Response Authentication (SHA1)
    • PostgreSQL Challenge-Response Authentication (MD5)
    • SIP Digest Authentication (MD5)
    • WPA
    • WPA2
    • NetNTLMv1
    • NetNTLMv1 + ESS
    • NetNTLMv2
    • Kerberos 5 AS-REQ Pre-Auth etype 23
    • Kerberos 5 TGS-REP etype 23
    • Netscape LDAP SHA/SSHA
    • LM
    • NTLM
    • Domain Cached Credentials (DCC), MS Cache
    • Domain Cached Credentials 2 (DCC2), MS Cache 2
    • MS-AzureSync PBKDF2-HMAC-SHA256
    • descrypt
    • bsdicrypt
    • md5crypt
    • sha256crypt
    • sha512crypt
    • bcrypt
    • scrypt
    • OSX v10.4
    • OSX v10.5
    • OSX v10.6
    • OSX v10.7
    • OSX v10.8
    • OSX v10.9
    • OSX v10.10
    • AIX {smd5}
    • AIX {ssha1}
    • AIX {ssha256}
    • AIX {ssha512}
    • Cisco-ASA
    • Cisco-PIX
    • Cisco-IOS
    • Cisco $8$
    • Cisco $9$
    • Juniper IVE
    • Juniper Netscreen/SSG (ScreenOS)
    • Android PIN
    • Windows 8+ phone PIN/Password
    • GRUB 2
    • CRC32
    • RACF
    • Radmin2
    • Redmine
    • OpenCart
    • Citrix Netscaler
    • SAP CODVN B (BCODE)
    • SAP CODVN F/G (PASSCODE)
    • SAP CODVN H (PWDSALTEDHASH) iSSHA-1
    • PeopleSoft
    • PeopleSoft PS_TOKEN
    • Skype
    • WinZip
    • 7-Zip
    • RAR3-hp
    • RAR5
    • AxCrypt
    • AxCrypt in memory SHA1
    • PDF 1.1 - 1.3 (Acrobat 2 - 4)
    • PDF 1.4 - 1.6 (Acrobat 5 - 8)
    • PDF 1.7 Level 3 (Acrobat 9)
    • PDF 1.7 Level 8 (Acrobat 10 - 11)
    • MS Office <= 2003 MD5
    • MS Office <= 2003 SHA1
    • MS Office 2007
    • MS Office 2010
    • MS Office 2013
    • Lotus Notes/Domino 5
    • Lotus Notes/Domino 6
    • Lotus Notes/Domino 8
    • Bitcoin/Litecoin wallet.dat
    • Blockchain, My Wallet
    • 1Password, agilekeychain
    • 1Password, cloudkeychain
    • Lastpass
    • Password Safe v2
    • Password Safe v3
    • Keepass 1 (AES/Twofish) and Keepass 2 (AES)
    • Plaintext
    • eCryptfs
    • Android FDE <= 4.3
    • Android FDE (Samsung DEK)
    • TrueCrypt
    • VeraCrypt

    - [ Hash modes ] -

    900 | MD4 | Raw Hash
    0 | MD5 | Raw Hash
    5100 | Half MD5 | Raw Hash
    100 | SHA1 | Raw Hash
    1300 | SHA-224 | Raw Hash
    1400 | SHA-256 | Raw Hash
    10800 | SHA-384 | Raw Hash
    1700 | SHA-512 | Raw Hash
    5000 | SHA-3(Keccak) | Raw Hash
    10100 | SipHash | Raw Hash
    6000 | RipeMD160 | Raw Hash
    6100 | Whirlpool | Raw Hash
    6900 | GOST R 34.11-94 | Raw Hash
    11700 | GOST R 34.11-2012 (Streebog) 256-bit | Raw Hash
    11800 | GOST R 34.11-2012 (Streebog) 512-bit | Raw Hash
    10 | md5($pass.$salt) | Raw Hash, Salted and
    20 | md5($salt.$pass) | Raw Hash, Salted and
    30 | md5(unicode($pass).$salt) | Raw Hash, Salted and
    40 | md5($salt.unicode($pass)) | Raw Hash, Salted and
    3800 | md5($salt.$pass.$salt) | Raw Hash, Salted and
    3710 | md5($salt.md5($pass)) | Raw Hash, Salted and
    2600 | md5(md5($pass)) | Raw Hash, Salted and
    4300 | md5(strtoupper(md5($pass))) | Raw Hash, Salted and
    4400 | md5(sha1($pass)) | Raw Hash, Salted and
    110 | sha1($pass.$salt) | Raw Hash, Salted and
    120 | sha1($salt.$pass) | Raw Hash, Salted and
    130 | sha1(unicode($pass).$salt) | Raw Hash, Salted and
    140 | sha1($salt.unicode($pass)) | Raw Hash, Salted and
    4500 | sha1(sha1($pass)) | Raw Hash, Salted and
    4700 | sha1(md5($pass)) | Raw Hash, Salted and
    4900 | sha1($salt.$pass.$salt) | Raw Hash, Salted and
    14400 | sha1(CX) | Raw Hash, Salted and
    1410 | sha256($pass.$salt) | Raw Hash, Salted and
    1420 | sha256($salt.$pass) | Raw Hash, Salted and
    1430 | sha256(unicode($pass).$salt) | Raw Hash, Salted and
    1440 | sha256($salt.unicode($pass)) | Raw Hash, Salted and
    1710 | sha512($pass.$salt) | Raw Hash, Salted and
    1720 | sha512($salt.$pass) | Raw Hash, Salted and
    1730 | sha512(unicode($pass).$salt) | Raw Hash, Salted and
    1740 | sha512($salt.unicode($pass)) | Raw Hash, Salted and
    50 | HMAC-MD5 (key = $pass) | Raw Hash, Authenticat
    60 | HMAC-MD5 (key = $salt) | Raw Hash, Authenticat
    150 | HMAC-SHA1 (key = $pass) | Raw Hash, Authenticat
    160 | HMAC-SHA1 (key = $salt) | Raw Hash, Authenticat
    1450 | HMAC-SHA256 (key = $pass) | Raw Hash, Authenticat
    1460 | HMAC-SHA256 (key = $salt) | Raw Hash, Authenticat
    1750 | HMAC-SHA512 (key = $pass) | Raw Hash, Authenticat
    1760 | HMAC-SHA512 (key = $salt) | Raw Hash, Authenticat
    14000 | DES (PT = $salt, key = $pass) | Raw Cipher, Known-Pla
    14100 | 3DES (PT = $salt, key = $pass) | Raw Cipher, Known-Pla
    400 | phpass | Generic KDF
    8900 | scrypt | Generic KDF
    11900 | PBKDF2-HMAC-MD5 | Generic KDF
    12000 | PBKDF2-HMAC-SHA1 | Generic KDF
    10900 | PBKDF2-HMAC-SHA256 | Generic KDF
    12100 | PBKDF2-HMAC-SHA512 | Generic KDF
    23 | Skype | Network protocols
    2500 | WPA/WPA2 | Network protocols
    4800 | iSCSI CHAP authentication, MD5(Chap) | Network protocols
    5300 | IKE-PSK MD5 | Network protocols
    5400 | IKE-PSK SHA1 | Network protocols
    5500 | NetNTLMv1 | Network protocols
    5500 | NetNTLMv1 + ESS | Network protocols
    5600 | NetNTLMv2 | Network protocols
    7300 | IPMI2 RAKP HMAC-SHA1 | Network protocols
    7500 | Kerberos 5 AS-REQ Pre-Auth etype 23 | Network protocols
    8300 | DNSSEC (NSEC3) | Network protocols
    10200 | Cram MD5 | Network protocols
    11100 | PostgreSQL CRAM (MD5) | Network protocols
    11200 | MySQL CRAM (SHA1) | Network protocols
    11400 | SIP digest authentication (MD5) | Network protocols
    13100 | Kerberos 5 TGS-REP etype 23 | Network protocols
    121 | SMF (Simple Machines Forum) | Forums, CMS, E-Commer
    400 | phpBB3 | Forums, CMS, E-Commer
    2611 | vBulletin < v3.8.5 | Forums, CMS, E-Commer
    2711 | vBulletin > v3.8.5 | Forums, CMS, E-Commer
    2811 | MyBB | Forums, CMS, E-Commer
    2811 | IPB (Invison Power Board) | Forums, CMS, E-Commer
    8400 | WBB3 (Woltlab Burning Board) | Forums, CMS, E-Commer
    11 | Joomla < 2.5.18 | Forums, CMS, E-Commer
    400 | Joomla > 2.5.18 | Forums, CMS, E-Commer
    400 | Wordpress | Forums, CMS, E-Commer
    2612 | PHPS | Forums, CMS, E-Commer
    7900 | Drupal7 | Forums, CMS, E-Commer
    21 | osCommerce | Forums, CMS, E-Commer
    21 | xt:Commerce | Forums, CMS, E-Commer
    11000 | PrestaShop | Forums, CMS, E-Commer
    124 | Django (SHA-1) | Forums, CMS, E-Commer
    10000 | Django (PBKDF2-SHA256) | Forums, CMS, E-Commer
    3711 | Mediawiki B type | Forums, CMS, E-Commer
    7600 | Redmine | Forums, CMS, E-Commer
    13900 | OpenCart | Forums, CMS, E-Commer
    12 | PostgreSQL | Database Server
    131 | MSSQL(2000) | Database Server
    132 | MSSQL(2005) | Database Server
    1731 | MSSQL(2012) | Database Server
    1731 | MSSQL(2014) | Database Server
    200 | MySQL323 | Database Server
    300 | MySQL4.1/MySQL5 | Database Server
    3100 | Oracle H: Type (Oracle 7+) | Database Server
    112 | Oracle S: Type (Oracle 11+) | Database Server
    12300 | Oracle T: Type (Oracle 12+) | Database Server
    8000 | Sybase ASE | Database Server
    141 | EPiServer 6.x < v4 | HTTP, SMTP, LDAP Serv
    1441 | EPiServer 6.x > v4 | HTTP, SMTP, LDAP Serv
    1600 | Apache $apr1$ | HTTP, SMTP, LDAP Serv
    12600 | ColdFusion 10+ | HTTP, SMTP, LDAP Serv
    1421 | hMailServer | HTTP, SMTP, LDAP Serv
    101 | nsldap, SHA-1(Base64), Netscape LDAP SHA | HTTP, SMTP, LDAP Serv
    111 | nsldaps, SSHA-1(Base64), Netscape LDAP SSHA | HTTP, SMTP, LDAP Serv
    1711 | SSHA-512(Base64), LDAP {SSHA512} | HTTP, SMTP, LDAP Serv
    11500 | CRC32 | Checksums
    3000 | LM | Operating-Systems
    1000 | NTLM | Operating-Systems
    1100 | Domain Cached Credentials (DCC), MS Cache | Operating-Systems
    2100 | Domain Cached Credentials 2 (DCC2), MS Cache 2 | Operating-Systems
    12800 | MS-AzureSync PBKDF2-HMAC-SHA256 | Operating-Systems
    1500 | descrypt, DES(Unix), Traditional DES | Operating-Systems
    12400 | BSDiCrypt, Extended DES | Operating-Systems
    500 | md5crypt $1$, MD5(Unix) | Operating-Systems
    3200 | bcrypt $2*$, Blowfish(Unix) | Operating-Systems
    7400 | sha256crypt $5$, SHA256(Unix) | Operating-Systems
    1800 | sha512crypt $6$, SHA512(Unix) | Operating-Systems
    122 | OSX v10.4, OSX v10.5, OSX v10.6 | Operating-Systems
    1722 | OSX v10.7 | Operating-Systems
    7100 | OSX v10.8, OSX v10.9, OSX v10.10 | Operating-Systems
    6300 | AIX {smd5} | Operating-Systems
    6700 | AIX {ssha1} | Operating-Systems
    6400 | AIX {ssha256} | Operating-Systems
    6500 | AIX {ssha512} | Operating-Systems
    2400 | Cisco-PIX | Operating-Systems
    2410 | Cisco-ASA | Operating-Systems
    500 | Cisco-IOS $1$ | Operating-Systems
    5700 | Cisco-IOS $4$ | Operating-Systems
    9200 | Cisco-IOS $8$ | Operating-Systems
    9300 | Cisco-IOS $9$ | Operating-Systems
    22 | Juniper Netscreen/SSG (ScreenOS) | Operating-Systems
    501 | Juniper IVE | Operating-Systems
    5800 | Android PIN | Operating-Systems
    13800 | Windows 8+ phone PIN/Password | Operating-Systems
    8100 | Citrix Netscaler | Operating-Systems
    8500 | RACF | Operating-Systems
    7200 | GRUB 2 | Operating-Systems
    9900 | Radmin2 | Operating-Systems
    125 | ArubaOS | Operating-Systems
    7700 | SAP CODVN B (BCODE) | Enterprise Applicatio
    7800 | SAP CODVN F/G (PASSCODE) | Enterprise Applicatio
    10300 | SAP CODVN H (PWDSALTEDHASH) iSSHA-1 | Enterprise Applicatio
    8600 | Lotus Notes/Domino 5 | Enterprise Applicatio
    8700 | Lotus Notes/Domino 6 | Enterprise Applicatio
    9100 | Lotus Notes/Domino 8 | Enterprise Applicatio
    133 | PeopleSoft | Enterprise Applicatio
    13500 | PeopleSoft Token | Enterprise Applicatio
    11600 | 7-Zip | Archives
    12500 | RAR3-hp | Archives
    13000 | RAR5 | Archives
    13200 | AxCrypt | Archives
    13300 | AxCrypt in memory SHA1 | Archives
    13600 | WinZip | Archives
    62XY | TrueCrypt | Full-Disk encryptions
    X | 1 = PBKDF2-HMAC-RipeMD160 | Full-Disk encryptions
    X | 2 = PBKDF2-HMAC-SHA512 | Full-Disk encryptions
    X | 3 = PBKDF2-HMAC-Whirlpool | Full-Disk encryptions
    X | 4 = PBKDF2-HMAC-RipeMD160 + boot-mode | Full-Disk encryptions
    Y | 1 = XTS 512 bit pure AES | Full-Disk encryptions
    Y | 1 = XTS 512 bit pure Serpent | Full-Disk encryptions
    Y | 1 = XTS 512 bit pure Twofish | Full-Disk encryptions
    Y | 2 = XTS 1024 bit pure AES | Full-Disk encryptions
    Y | 2 = XTS 1024 bit pure Serpent | Full-Disk encryptions
    Y | 2 = XTS 1024 bit pure Twofish | Full-Disk encryptions
    Y | 2 = XTS 1024 bit cascaded AES-Twofish | Full-Disk encryptions
    Y | 2 = XTS 1024 bit cascaded Serpent-AES | Full-Disk encryptions
    Y | 2 = XTS 1024 bit cascaded Twofish-Serpent | Full-Disk encryptions
    Y | 3 = XTS 1536 bit all | Full-Disk encryptions
    8800 | Android FDE < v4.3 | Full-Disk encryptions
    12900 | Android FDE (Samsung DEK) | Full-Disk encryptions
    12200 | eCryptfs | Full-Disk encryptions
    137XY | VeraCrypt | Full-Disk encryptions
    X | 1 = PBKDF2-HMAC-RipeMD160 | Full-Disk encryptions
    X | 2 = PBKDF2-HMAC-SHA512 | Full-Disk encryptions
    X | 3 = PBKDF2-HMAC-Whirlpool | Full-Disk encryptions
    X | 4 = PBKDF2-HMAC-RipeMD160 + boot-mode | Full-Disk encryptions
    X | 5 = PBKDF2-HMAC-SHA256 | Full-Disk encryptions
    X | 6 = PBKDF2-HMAC-SHA256 + boot-mode | Full-Disk encryptions
    Y | 1 = XTS 512 bit pure AES | Full-Disk encryptions
    Y | 1 = XTS 512 bit pure Serpent | Full-Disk encryptions
    Y | 1 = XTS 512 bit pure Twofish | Full-Disk encryptions
    Y | 2 = XTS 1024 bit pure AES | Full-Disk encryptions
    Y | 2 = XTS 1024 bit pure Serpent | Full-Disk encryptions
    Y | 2 = XTS 1024 bit pure Twofish | Full-Disk encryptions
    Y | 2 = XTS 1024 bit cascaded AES-Twofish | Full-Disk encryptions
    Y | 2 = XTS 1024 bit cascaded Serpent-AES | Full-Disk encryptions
    Y | 2 = XTS 1024 bit cascaded Twofish-Serpent | Full-Disk encryptions
    Y | 3 = XTS 1536 bit all | Full-Disk encryptions
    9700 | MS Office <= 2003 $0|$1, MD5 + RC4 | Documents
    9710 | MS Office <= 2003 $0|$1, MD5 + RC4, collider #1 | Documents
    9720 | MS Office <= 2003 $0|$1, MD5 + RC4, collider #2 | Documents
    9800 | MS Office <= 2003 $3|$4, SHA1 + RC4 | Documents
    9810 | MS Office <= 2003 $3|$4, SHA1 + RC4, collider #1 | Documents
    9820 | MS Office <= 2003 $3|$4, SHA1 + RC4, collider #2 | Documents
    9400 | MS Office 2007 | Documents
    9500 | MS Office 2010 | Documents
    9600 | MS Office 2013 | Documents
    10400 | PDF 1.1 - 1.3 (Acrobat 2 - 4) | Documents
    10410 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #1 | Documents
    10420 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #2 | Documents
    10500 | PDF 1.4 - 1.6 (Acrobat 5 - 8) | Documents
    10600 | PDF 1.7 Level 3 (Acrobat 9) | Documents
    10700 | PDF 1.7 Level 8 (Acrobat 10 - 11) | Documents
    9000 | Password Safe v2 | Password Managers
    5200 | Password Safe v3 | Password Managers
    6800 | Lastpass + Lastpass sniffed | Password Managers
    6600 | 1Password, agilekeychain | Password Managers
    8200 | 1Password, cloudkeychain | Password Managers
    11300 | Bitcoin/Litecoin wallet.dat | Password Managers
    12700 | Blockchain, My Wallet | Password Managers
    13400 | Keepass 1 (AES/Twofish) and Keepass 2 (AES) | Password Managers
    99999 | Plaintext | Plaintext
     
    Последнее редактирование: 17 янв 2017
  2. ChemgioKs1
    off

    ChemgioKs1 Пока одупляюсь БЕЗ ПРОБЕГА

    Сообщения:
    1
    Пол:
    Мужской
    Адрес:
    Đồng Nai
    Репутация:
    0
    Сфера:
    Спец.символы
    Wow! Cool img ;)