(06-26-2010, 02:52 PM)atom Wrote: sorry, not possible. internal structures of both hashcat and oclHashcat can only work with a maximum password < 55 chars length.
@atom: and how is WoltLab BB3 scheme exceeding this limit? Both the hash and the salt are 20 bytes in length (they are in hex). The maximum input length at a time is 40 bytes.
(06-26-2010, 11:44 AM)Xanadrel Wrote: Just asking for WBB3 algo support,
It's sha1($salt.sha1($salt.sha1($pass)))
Are you sure about sha1($salt.sha1($salt.sha1($pass)))?
Code:
import hashlib
import binascii
# WBB3 scheme -> sha1($salt.sha1($salt.sha1($pass))
hash = binascii.unhexlify("e2063f7c629d852302d3020599376016ff340399")
salt = binascii.unhexlify("0b053db07dc02bc6f6e24e00462f17e3c550afa9")
password = "123456"
m0 = hashlib.sha1()
m0.update(password)
m1 = hashlib.sha1()
m1.update(salt)
m1.update(m0.digest())
m2 = hashlib.sha1()
m2.update(salt)
m2.update(m1.digest())
print "Output:", binascii.hexlify(m2.digest())
print "Actual", binascii.hexlify(hash)
#Output: fe939061fa0490f3c63c12a4f550f32029d7b83d
#Actual e2063f7c629d852302d3020599376016ff340399
Output: fe939061fa0490f3c63c12a4f550f32029d7b83d
Actual e2063f7c629d852302d3020599376016ff340399
The output doesn't match the actual hash value using the encryption scheme you mentioned.