#md5 #hash #password #site #crack #yearn #4x

yanked crack_yearn_md5

Software to crack the Yearn v2 site password from a 4x md5 hash found in the sourcecode

1.0.0 Dec 7, 2020

#48 in #md5

AGPL-3.0

5.5MB
76 lines

crack_yearn_md5

This is a Rust project that is desgined to reverse engineer the password to the Yearn v2 site from a 4x md5 hashed version of it (dbba1bfe930d953cabcc03d7b6ab05e) visible in their JavaScript.

A copy of the chunk file from which the hash was extracted from is saved in this repository.

Some hints were given by the yEarn team:

  • It will be in this format: xxxxxxxxxxxxxxxxx........................................................!1 (replace the 17 xs with an actual 17 character string)
  • The 17 xs will only be chars in this set (can be repeated): [b, d, e, i, l, m, o, s, t, u, -]

This project attempts to crack the hash in the following way:

  • Takes the charset and creates all possible 17 letter combinations with it (this takes A LOT OF TIME)
  • Appends ........................................................!1 to each combo and runs an md5 hash function 4 times on it like so: md5(md5(md5(md5(combo))))
  • Checks each hash against: dbba1bfe930d953cabcc03d7b6ab05e, if it matches, the program exits and logs out the unhashed password.

Dependencies