Post Reply 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
MD5 Crack with Salt
05-07-2012, 04:22 PM
Post: #1
MD5 Crack with Salt
Hello,

been trying for a few days now trying to get hashcat to work, cracking a MD5 hash with salt.

This is just a quick example or what I am trying to do

69c12c189531e95fc6b6b4191ce29220 is the hash
the salt is dz
the password for this is dz0000
fakehash has the above hash
salt has the above salt

This does not work:
./hashcat-cli32.bin -m 0 -a 3 -e salt --bf-pw-min=4 --bf-pw-max=6 --bf-cs-buf=1234567890 fakehash

When I run this it does work:
./hashcat-cli32.bin -m 0 -a 3 -e salt --bf-pw-min=4 --bf-pw-max=6 --bf-cs-buf=1234567890dz fakehash

When I run this it works but tries
./hashcat-cli32.bin -m 0 -a 3 -e salt --bf-pw-min=5 --bf-pw-max=6 --bf-cs-buf=abcdefghijklmnopqrstuvwxyz1234567890ABCDEFGHIJKLMNOPQRSTUVWXYZ fackhash

to my understanding it start 0000 and goes from there so it should put dz in front and then at 6 it should do dz0000 resulting in the first crack. But instead it does 000000 and goes from there not using the salt. How do I force it to use salt any help would be greatly apprenticed.
Find all posts by this user
Quote this message in a reply
05-07-2012, 04:30 PM
Post: #2
RE: MD5 Crack with Salt
I think you are a little confused about what a salt is. Using a salt will NOT prepend characters to your string. It is actually determining how to manipulate your password before hashing it. In addition, you are specifying hash mode 0, which does not use a salt to begin with.

Actually, doing a quick check, it appears that your hash 69c12c189531e95fc6b6b4191ce29220 is in-fact a plain MD5, and is NOT salted. So you can get rid of all the salt lines.
Find all posts by this user
Quote this message in a reply
05-07-2012, 04:34 PM (This post was last modified: 05-07-2012 04:35 PM by atom.)
Post: #3
RE: MD5 Crack with Salt
root@ht:~/hashcat-0.40# cat hash
69c12c189531e95fc6b6b4191ce29220:dz

root@ht:~/hashcat-0.40# ./hashcat-cli64.bin -m 2 hash -a 3 --pw-min 4 ?d?d?d?d

69c12c189531e95fc6b6b4191ce29220:dz:0000
All hashes have been recovered
Visit this user's website Find all posts by this user
Quote this message in a reply
05-07-2012, 04:34 PM
Post: #4
RE: MD5 Crack with Salt
additionally, if you want to use a salt to simulate the effect of prepending chars, you can use hash mode 2: MD5($salt.$hash)
Find all posts by this user
Quote this message in a reply
05-07-2012, 04:34 PM (This post was last modified: 05-07-2012 04:44 PM by Ze12o.)
Post: #5
RE: MD5 Crack with Salt
(05-07-2012 04:30 PM)unix-ninja Wrote:  I think you are a little confused about what a salt is. Using a salt will NOT prepend characters to your string. It is actually determining how to manipulate your password before hashing it. In addition, you are specifying hash mode 0, which does not use a salt to begin with.

Actually, doing a quick check, it appears that your hash 69c12c189531e95fc6b6b4191ce29220 is in-fact a plain MD5, and is NOT salted. So you can get rid of all the salt lines.

This was just a test the hashes that I am pulling tells me what the salt is so I know the first two charters thus turning it from a 6 letter password guess into a 4 letter work password. Trying to make the run time less by telling it what the first two letters are. This is because the passwords its giving me are 8 letters and with the salt makes it 10 so cutting the time down would be a very good thing.

(05-07-2012 04:34 PM)atom Wrote:  root@ht:~/hashcat-0.40# cat hash
69c12c189531e95fc6b6b4191ce29220Big Grinz

root@ht:~/hashcat-0.40# ./hashcat-cli64.bin -m 2 hash -a 3 --pw-min 4 ?d?d?d?d

69c12c189531e95fc6b6b4191ce29220Big Grinz:0000
All hashes have been recovered

./hashcat-cli64.bin -m 2 fakehash -a 3 --pw-min 4 ?d?d?d?d
bash: ./hashcat-cli64.bin: cannot execute binary file

This is in fakehash
69c12c189531e95fc6b6b4191ce29220Big Grinz
Find all posts by this user
Quote this message in a reply
05-07-2012, 05:06 PM
Post: #6
RE: MD5 Crack with Salt
come on, you have to use ./hashcat-cli32.bin instead. pls use your brain, just a bit
Visit this user's website Find all posts by this user
Quote this message in a reply
05-07-2012, 05:11 PM
Post: #7
RE: MD5 Crack with Salt
(05-07-2012 05:06 PM)atom Wrote:  come on, you have to use ./hashcat-cli32.bin instead. pls use your brain, just a bit

Sad sorry, thanks for the help atom
Find all posts by this user
Quote this message in a reply
05-07-2012, 05:11 PM
Post: #8
RE: MD5 Crack with Salt
L0L
Find all posts by this user
Quote this message in a reply
11-01-2013, 10:43 PM (This post was last modified: 11-03-2013 04:28 PM by radix.)
Post: #9
RE: MD5 Crack with Salt
please cracked this hash :
Find all posts by this user
Quote this message in a reply
11-02-2013, 02:56 AM (This post was last modified: 11-03-2013 04:28 PM by radix.)
Post: #10
RE: MD5 Crack with Salt
(11-01-2013 10:43 PM)sezar21m Wrote:  please cracked this hash :
A ban, please.
Find all posts by this user
Quote this message in a reply
Post Reply