hashcat Forum

Full Version: SQL 2012 Hashes with Salt
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
We have a software package that uses SQL 2012.  In one of the tables I can see all of the user logins.  There is a password column and a salt column.  Of course the password is hashed.  Maybe wrongfully, but I would assume I can't just can't crack the hash in its current form.

What is the proper way to extract these hashes/salts to run through hashcat?
You have to put them into form hash:salt with correct hashcat mode (1731 in your case)