How to crack a bcrypt hash with salt? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: How to crack a bcrypt hash with salt? (/thread-10645.html) |
How to crack a bcrypt hash with salt? - Crypt0nic - 03-01-2022 Hello! I am learning how to use Hashcat to crack different types of passwords. I hope someone here can help me. I cannot find anything online so I made an account on this forum just to ask this. I have a bcrypt hash with a known salt. How would I go about cracking it? Where do I tell Hashcat I have a salt for it to use? And am I using the right hash mode? I was thinking about using 3200 but not 100% sure it's the right one to use. If you need more information from me to help solve this problem just ask, I'll reply to you. RE: How to crack a bcrypt hash with salt? - royce - 03-02-2022 hashcat detects and uses the salt automatically. Simply pass the hash it on the command line (may need to single-quote the dollar signs). It's mode 3200 (unless it's a nested hash of some kind). So hashcat -m 3200 'hash', along with what attack you want (straight wordlist (-a 0) is probably what you'd want with a slow hash) RE: How to crack a bcrypt hash with salt? - v71221 - 03-02-2022 (03-02-2022, 12:38 AM)royce Wrote: hashcat detects and uses the salt automatically. For all hash-modes ? or only for 3200 ? So, you don't need to pass the salt to Hashcat, even if you know that particular salt ? Below is the example hash from https://hashcat.net/wiki/doku.php?id=example_hashes Code: C:\hashcat-6.2.5>hashcat.exe -a 3 -m 3200 "$2a$05$LhayLxezLhK1LhWvKxCyLOj0j1u.Kj0jZ0pEmm134uzrQlFvQJLF6" "hashcat" RE: How to crack a bcrypt hash with salt? - royce - 03-02-2022 If the salt is already in the hash, it will automatically be used, for all hash types. If the salt is not already in the hash, you can supply it on the command line. |