Posts: 7
Threads: 3
Joined: Mar 2021
03-22-2021, 01:36 PM
(This post was last modified: 03-22-2021, 06:27 PM by royce.
Edit Reason: [redacted]
)
Hello. need help, not hashcat cannot decrypt. this type of hash. help me please
Quote:./ hashcat -w 3 -m 120 -a [redacted]: 0x3535393639"C:\Users\Admin\Downloads\dict\list.txt" --session = test3 -o "C:\Users\Admin\Desktop\result.txt"
Posts: 889
Threads: 15
Joined: Sep 2017
03-22-2021, 04:52 PM
(This post was last modified: 03-22-2021, 06:27 PM by royce.
Edit Reason: [redacted]
)
(03-22-2021, 01:36 PM)Mont1x Wrote: Hello. need help, not hashcat cannot decrypt. this type of hash. help me please
Quote:./ hashcat -w 3 -m 120 -a [redacted]: 0x3535393639"C:\Users\Admin\Downloads\dict\list.txt" --session = test3 -o "C:\Users\Admin\Desktop\result.txt"
first
NEVER post hashes -> see forum rules
second
exhausted means basicly all your passwords have been tested and you are done (not cracked? password not in your given list)
third
see example hash for mode 120
https://hashcat.net/wiki/doku.php?id=example_hashes
the 0x in your salt shouldnt be there
Posts: 7
Threads: 3
Joined: Mar 2021
03-22-2021, 05:22 PM
(This post was last modified: 03-23-2021, 03:52 AM by Mont1x.
Edit Reason: [redacted]
)
(03-22-2021, 04:52 PM)Snoopy Wrote: (03-22-2021, 01:36 PM)Mont1x Wrote: Hello. need help, not hashcat cannot decrypt. this type of hash. help me please
Quote:./hashcat -w 3 -m 120 -a [redacted]:0x3535393639"C:\Users\Admin\Downloads\dict\list.txt" --session = test3 -o "C:\Users\Admin\Desktop\result.txt"
first
NEVER post hashes -> see forum rules
second
exhausted means basicly all your passwords have been tested and you are done (not cracked? password not in your given list)
third
see example hash for mode 120 https://hashcat.net/wiki/doku.php?id=example_hashes
the 0x in your salt shouldnt be there
sorry about the forum rules. I have bad knowledge of the language. What is the best mode for me to use for this type of hash.
Posts: 7
Threads: 3
Joined: Mar 2021
03-22-2021, 05:27 PM
(This post was last modified: 03-22-2021, 06:27 PM by royce.
Edit Reason: [redacted]
)
(03-22-2021, 04:52 PM)Snoopy Wrote: (03-22-2021, 01:36 PM)Mont1x Wrote: Hello. need help, not hashcat cannot decrypt. this type of hash. help me please
Quote:./ hashcat -w 3 -m 120 -a [redacted]: 0x3535393639"C:\Users\Admin\Downloads\dict\list.txt" --session = test3 -o "C:\Users\Admin\Desktop\result.txt"
first
NEVER post hashes -> see forum rules
second
exhausted means basicly all your passwords have been tested and you are done (not cracked? password not in your given list)
third
see example hash for mode 120 https://hashcat.net/wiki/doku.php?id=example_hashes
the 0x in your salt shouldnt be there
I have a matching password on my list. I have similar ones that have not been decrypt hashed
Posts: 889
Threads: 15
Joined: Sep 2017
03-22-2021, 10:48 PM
(This post was last modified: 03-22-2021, 10:50 PM by Snoopy.)
then try removing the space and 0x to match the required style for this hashtype
change
[redacted]: 0x3535393639
to
[redacted]:3535393639
Posts: 7
Threads: 3
Joined: Mar 2021
(03-22-2021, 10:48 PM)Snoopy Wrote: then try removing the space and 0x to match the required style for this hashtype
change
[redacted]: 0x3535393639
to
[redacted]:3535393639
does not work
Posts: 889
Threads: 15
Joined: Sep 2017
i really dont get your point, you said:
Quote:I have a matching password on my list. I have similar ones that have not been decrypt hashed
so you KNOW the password/password for the hash you are trying to crack? did you generated it yourself? if yes, then maybe the hash-mode you used is not 120 aka sha1($salt.$pass) OR there is an option --hex-salt ,the original 0x in front of your salt could assume this
Posts: 7
Threads: 3
Joined: Mar 2021
(03-23-2021, 04:28 PM)Snoopy Wrote: i really dont get your point, you said:
Quote:I have a matching password on my list. I have similar ones that have not been decrypt hashed
so you KNOW the password/password for the hash you are trying to crack? did you generated it yourself? if yes, then maybe the hash-mode you used is not 120 aka sha1($salt.$pass) OR there is an option --hex-salt ,the original 0x in front of your salt could assume this
I found the salt. but I can't find the hash type.
change
[redacted]: 0x3535393639
to
[redacted]:55969
Posts: 889
Threads: 15
Joined: Sep 2017
03-25-2021, 04:54 PM
(This post was last modified: 03-25-2021, 04:54 PM by Snoopy.)
(03-24-2021, 04:46 AM)Mont1x Wrote: (03-23-2021, 04:28 PM)Snoopy Wrote: i really dont get your point, you said:
Quote:I have a matching password on my list. I have similar ones that have not been decrypt hashed
so you KNOW the password/password for the hash you are trying to crack? did you generated it yourself? if yes, then maybe the hash-mode you used is not 120 aka sha1($salt.$pass) OR there is an option --hex-salt ,the original 0x in front of your salt could assume this
I found the salt. but I can't find the hash type.
change
[redacted]: 0x3535393639
to
[redacted]:55969
well, then you should "investigate" from which source your hashes came from, and which hahshing algorithm the source was using, from the given length (your first post if i remember it right)
it SHOULD be sha1/sha128 with salt so it SHOULD be mode 110