MD5 Crack with Salt
#5
(05-07-2012, 04:30 PM)unix-ninja Wrote: I think you are a little confused about what a salt is. Using a salt will NOT prepend characters to your string. It is actually determining how to manipulate your password before hashing it. In addition, you are specifying hash mode 0, which does not use a salt to begin with.

Actually, doing a quick check, it appears that your hash 69c12c189531e95fc6b6b4191ce29220 is in-fact a plain MD5, and is NOT salted. So you can get rid of all the salt lines.

This was just a test the hashes that I am pulling tells me what the salt is so I know the first two charters thus turning it from a 6 letter password guess into a 4 letter work password. Trying to make the run time less by telling it what the first two letters are. This is because the passwords its giving me are 8 letters and with the salt makes it 10 so cutting the time down would be a very good thing.

(05-07-2012, 04:34 PM)atom Wrote: root@ht:~/hashcat-0.40# cat hash
69c12c189531e95fc6b6b4191ce29220:dz

root@ht:~/hashcat-0.40# ./hashcat-cli64.bin -m 2 hash -a 3 --pw-min 4 ?d?d?d?d

69c12c189531e95fc6b6b4191ce29220:dz:0000
All hashes have been recovered

./hashcat-cli64.bin -m 2 fakehash -a 3 --pw-min 4 ?d?d?d?d
bash: ./hashcat-cli64.bin: cannot execute binary file

This is in fakehash
69c12c189531e95fc6b6b4191ce29220:dz


Messages In This Thread
MD5 Crack with Salt - by Ze12o - 05-07-2012, 04:22 PM
RE: MD5 Crack with Salt - by unix-ninja - 05-07-2012, 04:30 PM
RE: MD5 Crack with Salt - by Ze12o - 05-07-2012, 04:34 PM
RE: MD5 Crack with Salt - by atom - 05-07-2012, 04:34 PM
RE: MD5 Crack with Salt - by unix-ninja - 05-07-2012, 04:34 PM
RE: MD5 Crack with Salt - by atom - 05-07-2012, 05:06 PM
RE: MD5 Crack with Salt - by Ze12o - 05-07-2012, 05:11 PM
RE: MD5 Crack with Salt - by M@LIK - 05-07-2012, 05:11 PM
RE: MD5 Crack with Salt - by sezar21m - 11-01-2013, 10:43 PM
RE: MD5 Crack with Salt - by mastercracker - 11-02-2013, 02:56 AM