Hashcat can't crack salted MD5?
#1
Hello!

I would like to crack such a function:
md5( md5($salt) . md5($pass) );

Hashcat can't do that, but can:
md5( $salt . md5($pass) );

So I think I can manually hash a salt and use this second function (3710). I wanted to test it:
pass = 'ola' = 2fe04e524ba40505a82e03a2819429cc
salt = 'salt' = ceb20772e0c9d240c75eb26b0e37abee

final hash = md5('ceb20772e0c9d240c75eb26b0e37abee2fe04e524ba40505a82e03a2819429cc') = be22622c77c114703627f92c3dd9afb8

I created an input file for hashcat:
Quote:# hash : md5(salt)
be22622c77c114703627f92c3dd9afb8:ceb20772e0c9d240c75eb26b0e37abee

And run it using command:
Quote:./hashcat-cli64.bin -m 3710 -a 3 input ?a?a?a

There is no result. What am I doing wrong?
#2
you're wrong. i guess you want to crack ipb2 or mybb which are the most popular software to use md5( md5($salt) . md5($pass) );

you can simply use -m 2811 to crack it.

you can not use -m 3710 because "ceb20772e0c9d240c75eb26b0e37abee2fe04e524ba40505a82e03a2819429cc" is > length 55 and therefore would need to call another transform round which makes the cracking slow. therefore use -m 2811 which is optimized to do this and precomputes md5(salt) in the startup phase once