| Crates.io | crack_yearn_md5 |
| lib.rs | crack_yearn_md5 |
| version | 1.0.0 |
| created_at | 2020-12-07 02:33:30.716695+00 |
| updated_at | 2020-12-07 02:33:30.716695+00 |
| description | Software to crack the Yearn v2 site password from a 4x md5 hash found in the sourcecode. |
| homepage | |
| repository | |
| max_upload_size | |
| id | 320350 |
| size | 5,268,526 |
This is a Rust project that is desgined to reverse engineer the password to the Yearn v2 site from a 4x md5 hashed version of it (dbba1bfe930d953cabcc03d7b6ab05e) visible in their JavaScript.
A copy of the chunk file from which the hash was extracted from is saved in this repository.
xxxxxxxxxxxxxxxxx........................................................!1 (replace the 17 xs with an actual 17 character string)xs will only be chars in this set (can be repeated): [b, d, e, i, l, m, o, s, t, u, -]........................................................!1 to each combo and runs an md5 hash function 4 times on it like so: md5(md5(md5(md5(combo))))dbba1bfe930d953cabcc03d7b6ab05e, if it matches, the program exits and logs out the unhashed password.