Posts: 7
	Threads: 3
	Joined: Mar 2021
	
	
 
	
		
		
 03-22-2021, 01:36 PM 
(This post was last modified: 03-22-2021, 06:27 PM by royce.
 Edit Reason: [redacted]
)
 
		03-22-2021, 01:36 PM 
(This post was last modified: 03-22-2021, 06:27 PM by royce.
 Edit Reason: [redacted]
)
		
	 
	
		Hello. need help, not hashcat cannot decrypt. this type of hash. help me please
Quote:./ hashcat -w 3 -m 120 -a [redacted]: 0x3535393639"C:\Users\Admin\Downloads\dict\list.txt"  --session = test3 -o "C:\Users\Admin\Desktop\result.txt"
	 
 
	
	
	
		
	Posts: 927
	Threads: 16
	Joined: Sep 2017
	
	
 
	
		
		
		03-22-2021, 04:52 PM 
(This post was last modified: 03-22-2021, 06:27 PM by royce.
 Edit Reason: [redacted]
)
		
	 
	
		 (03-22-2021, 01:36 PM)Mont1x Wrote:  Hello. need help, not hashcat cannot decrypt. this type of hash. help me please
Quote:./ hashcat -w 3 -m 120 -a [redacted]: 0x3535393639"C:\Users\Admin\Downloads\dict\list.txt"  --session = test3 -o "C:\Users\Admin\Desktop\result.txt"
first
NEVER post hashes -> see forum rules
second
exhausted means basicly all your passwords have been tested and you are done (not cracked? password not in your given list)
third
see example hash for mode 120 
https://hashcat.net/wiki/doku.php?id=example_hashes
the 0x in your salt shouldnt be there
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 7
	Threads: 3
	Joined: Mar 2021
	
	
 
	
		
		
		03-22-2021, 05:22 PM 
(This post was last modified: 03-23-2021, 03:52 AM by Mont1x.
 Edit Reason: [redacted]
)
		
	 
	
		 (03-22-2021, 04:52 PM)Snoopy Wrote:   (03-22-2021, 01:36 PM)Mont1x Wrote:  Hello. need help, not hashcat cannot decrypt. this type of hash. help me please
Quote:./hashcat -w 3 -m 120 -a [redacted]:0x3535393639"C:\Users\Admin\Downloads\dict\list.txt"  --session = test3 -o "C:\Users\Admin\Desktop\result.txt"
first
NEVER post hashes -> see forum rules
second
exhausted means basicly all your passwords have been tested and you are done (not cracked? password not in your given list)
third
see example hash for mode 120 https://hashcat.net/wiki/doku.php?id=example_hashes
the 0x in your salt shouldnt be there
sorry  about the forum rules. I have bad knowledge of the language. What is the best mode for me to use for this type of hash.
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 7
	Threads: 3
	Joined: Mar 2021
	
	
 
	
		
		
		03-22-2021, 05:27 PM 
(This post was last modified: 03-22-2021, 06:27 PM by royce.
 Edit Reason: [redacted]
)
		
	 
	
		 (03-22-2021, 04:52 PM)Snoopy Wrote:   (03-22-2021, 01:36 PM)Mont1x Wrote:  Hello. need help, not hashcat cannot decrypt. this type of hash. help me please
Quote:./ hashcat -w 3 -m 120 -a [redacted]: 0x3535393639"C:\Users\Admin\Downloads\dict\list.txt"  --session = test3 -o "C:\Users\Admin\Desktop\result.txt"
first
NEVER post hashes -> see forum rules
second
exhausted means basicly all your passwords have been tested and you are done (not cracked? password not in your given list)
third
see example hash for mode 120 https://hashcat.net/wiki/doku.php?id=example_hashes
the 0x in your salt shouldnt be there
I have a matching password on my list. I have similar ones that have not been decrypt hashed
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 927
	Threads: 16
	Joined: Sep 2017
	
	
 
	
		
		
		03-22-2021, 10:48 PM 
(This post was last modified: 03-22-2021, 10:50 PM by Snoopy.)
		
	 
	
		then try removing the space and 0x to match the required style for this hashtype
change
[redacted]: 0x3535393639
to
[redacted]:3535393639
	
	
	
	
	
 
 
	
	
	
		
	Posts: 7
	Threads: 3
	Joined: Mar 2021
	
	
 
	
	
		 (03-22-2021, 10:48 PM)Snoopy Wrote:  then try removing the space and 0x to match the required style for this hashtype
change
[redacted]: 0x3535393639
to
[redacted]:3535393639
does not work
	
 
	
	
	
	
 
 
	
	
	
		
	Posts: 927
	Threads: 16
	Joined: Sep 2017
	
	
 
	
	
		i really dont get your point, you said:
Quote:I have a matching password on my list. I have similar ones that have not been decrypt hashed
so you KNOW the password/password for the hash you are trying to crack? did you generated it yourself? if yes, then maybe the hash-mode you used is not 120 aka sha1($salt.$pass) OR there is an option --hex-salt ,the original 0x in front of your salt could assume this
	
 
 
	
	
	
		
	Posts: 7
	Threads: 3
	Joined: Mar 2021
	
	
 
	
	
		 (03-23-2021, 04:28 PM)Snoopy Wrote:  i really dont get your point, you said:
Quote:I have a matching password on my list. I have similar ones that have not been decrypt hashed
so you KNOW the password/password for the hash you are trying to crack? did you generated it yourself? if yes, then maybe the hash-mode you used is not 120 aka sha1($salt.$pass) OR there is an option --hex-salt ,the original 0x in front of your salt could assume this
I found the salt. but I can't find the hash type.
change
[redacted]: 0x3535393639
to
[redacted]:55969
	 
	
	
	
	
 
 
	
	
	
		
	Posts: 927
	Threads: 16
	Joined: Sep 2017
	
	
 
	
		
		
		03-25-2021, 04:54 PM 
(This post was last modified: 03-25-2021, 04:54 PM by Snoopy.)
		
	 
	
		 (03-24-2021, 04:46 AM)Mont1x Wrote:   (03-23-2021, 04:28 PM)Snoopy Wrote:  i really dont get your point, you said:
Quote:I have a matching password on my list. I have similar ones that have not been decrypt hashed
so you KNOW the password/password for the hash you are trying to crack? did you generated it yourself? if yes, then maybe the hash-mode you used is not 120 aka sha1($salt.$pass) OR there is an option --hex-salt ,the original 0x in front of your salt could assume this
I found the salt. but I can't find the hash type.
change
[redacted]: 0x3535393639
to
[redacted]:55969
well, then you should "investigate" from which source your hashes came from, and which hahshing algorithm the source was using, from the given length (your first post if i remember it right)
it SHOULD be sha1/sha128 with salt so it SHOULD be mode 110