crack_yearn_md5

Crates.iocrack_yearn_md5
lib.rscrack_yearn_md5
version1.0.0
sourcesrc
created_at2020-12-07 02:33:30.716695
updated_at2020-12-07 02:33:30.716695
descriptionSoftware to crack the Yearn v2 site password from a 4x md5 hash found in the sourcecode.
homepage
repository
max_upload_size
id320350
size5,268,526
t11s (TransmissionsDev)

documentation

README

crack_yearn_md5

This is a Rust project that is desgined to reverse engineer the password to the Yearn v2 site from a 4x md5 hashed version of it (dbba1bfe930d953cabcc03d7b6ab05e) visible in their JavaScript.

A copy of the chunk file from which the hash was extracted from is saved in this repository.

Some hints were given by the yEarn team:

  • It will be in this format: xxxxxxxxxxxxxxxxx........................................................!1 (replace the 17 xs with an actual 17 character string)
  • The 17 xs will only be chars in this set (can be repeated): [b, d, e, i, l, m, o, s, t, u, -]

This project attempts to crack the hash in the following way:

  • Takes the charset and creates all possible 17 letter combinations with it (this takes A LOT OF TIME)
  • Appends ........................................................!1 to each combo and runs an md5 hash function 4 times on it like so: md5(md5(md5(md5(combo))))
  • Checks each hash against: dbba1bfe930d953cabcc03d7b6ab05e, if it matches, the program exits and logs out the unhashed password.
Commit count: 0

cargo fmt