Hey everybody !
Is there a way to crack sha1(Linkedin) on the new hashcat release ?! i can't find the oclhashcat to crack my hashes !
Thanks guys !
There is nothing unusual about the 2012-era LinkedIn SHA1 hashes - they're generic raw SHA1.
There is only one version of hashcat now - does OpenCL or CUDA (but at least one is required, for either CPU or GPU).
Thanks for the reply dude ! but usin generic sha1 "-a 100" or any other iteration doesnt crack my hashes thaught maybe if i used the specefic Sha1 Linkedin it will solve my problem ! Ps: my hashes are from the 2012 era

Lol -and apparently I used to know this (2017) ... and totally forgot! Thanks, philsmd!
So i guess there are no plans to restore the - 190 anytime soon ! is there a way to get an old realease <3.0 so i can crack my hashes ? Thanks for your time

Thanks a lot Phill ! i'll try the old cuda release and the i'll add the changes if it doesn't work ! posting results after !
It seems like hashcat v6.1.1 is still using the masked hash logic for SHA1 (-m 100 ) which should probably be marked as bug. That is to say that hashcat seems to be ignoring the first 5 nibbles of the SHA1 hash while checking (potential bug?)
SHA1(testing123) = 4c0d2b951ffabd6f9a10489dc40fc356ec1d26d5
But hashcat will find this hash for testing123:
hashcat -m 100 -a3 00000b951ffabd6f9a10489dc40fc356ec1d26d5 testing?d?d?d
00000b951ffabd6f9a10489dc40fc356ec1d26d5:testing123
Please can someone report this as a bug? Unless it is considered a feature?
I don't know about it's official bug/feature status, but I can say that with all remaining bits being identical, the likelihood of any given hash being anything other than an accidental or deliberate alteration of the "true" hash is very low. One could argue that it probably shouldn't be -m 100, though, and instead its own mode.