NTLM Kerberos bcrypt Wallets File Recovery Database Hashes WiFi Cracking Disk Encryption About Get Started
ENES中文RU

bcrypt & Web Hash Cracking Service

Recover passwords from bcrypt, phpass (WordPress/Joomla), OpenCart, and other slow web application hashes. GPU-powered for maximum throughput.

Submit Your Hash →

Web Application Hash Types

bcrypt (Hashcat Mode 3200)

bcrypt is a Blowfish-based password hashing algorithm, intentionally slow with configurable cost factor (typically 10-12). Used by Ruby on Rails, Django, Node.js, and modern frameworks.

Example: $2b$10$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy

Slow by design, but weak passwords still fall with targeted GPU attacks.

phpass / WordPress (Mode 400)

WordPress, Joomla, phpBB use phpass with MD5-based iterated hashing (8192 iterations). Hashes from wp_users look like: $P$B... or $H$...

Faster than bcrypt but still significantly slower than raw MD5.

OpenCart (Mode 13900)

OpenCart uses SHA1 with salt: sha1(salt + sha1(salt + sha1(password))). Faster than bcrypt, crackable with dictionary attacks.

Common Scenarios

Pricing

OpenCart: $100. phpass/WordPress: $150. bcrypt: $200. Bulk pricing available. No result = no charge.

FAQ

Can you crack bcrypt with high cost factor (12+)?
Yes, but it takes longer. Each increase doubles computation time. We adjust pricing accordingly.
I have a WordPress dump. What do I send?
Send user_pass values from wp_users table (starting with $P$ or $H$). Optionally usernames for targeted wordlists.
phpass vs bcrypt?
phpass uses MD5-based hashing (8192 iterations) — faster to crack. bcrypt (Blowfish, cost 10-12) is tougher. WordPress $150, bcrypt $200.

Related Services

Need Web Hashes
Cracked?

Send your hash. Free assessment, pay only for results.

@HashCrackNet contact@hashcrack.net