SQL 2012 Hashes with Salt - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: SQL 2012 Hashes with Salt (/thread-10574.html) |
SQL 2012 Hashes with Salt - slawson - 01-10-2022 We have a software package that uses SQL 2012. In one of the tables I can see all of the user logins. There is a password column and a salt column. Of course the password is hashed. Maybe wrongfully, but I would assume I can't just can't crack the hash in its current form. What is the proper way to extract these hashes/salts to run through hashcat? RE: SQL 2012 Hashes with Salt - Maroslawxp - 01-17-2022 You have to put them into form hash:salt with correct hashcat mode (1731 in your case) |