Decrypt MD5, SHA and DES hashes successfully with PasswdRecall

Before we get into the actual decryption of hashes, it is important to know the basics of hashed strings. Hash strings are one-way encrypted strings which cannot be decoded as such. It is only possible to match the initial password to the Encrypted string and get the result. No two strings can give the exact same Encrypted checksum.

Now, these Hashes are used in protecting our passwords in most databases. Our, passwords are not directly stored, but the MD5 hashed checksums are stored in the database. When we want access to any service, the checksum is matched with the checksum created by the password we enter. If they both match, we are given access to the service.

In most cases it is possible to recover your password by answering a security question or giving your email address for verification. But, in some high security applications its not possible to do so.

So, in such cases there is a need to decrypt the MD5 hashed checksum and get the original password. We had mentioned a few MD5 hash decryption services which do this for free, but their chances of giving you a correct answer are pretty slim.

So, now we have come across a service called PasswdRecall.

Its a paid service especially for IT Specialists, where they promise to give a 100% correctly decrypted string from its hashed file when the password is upto 8 characters. They charge a mere $2.99 for successfully decrypting a single password!

We have personally tested this service with complex passwords like ganD41f and confirmed that it actually gives correct results.

PasswdRecall runs brute-force hash decryption on HPC cluster equipped with NVIDIA Tesla GPUs along with traditional dictionary search. They use 6 billion words dictionary, to give you the best possible results! This computing power allows them to crack hashes of up to 8 characters long with 100% success rate. Longer passwords are cracked using dictionary or by brute-force but with lower probability of successful decryption.

The best part about the service is that they don’t charge you if they aren’t able to decrypt your password successfully. So, its only a win-win situation for the customers; If you get a satisfactory answer, you will be charged or you got nothing to lose!

  • Meet

    I guess they should or might be storing the some number of password and hashes already in their DBs.