hashcat Forum
bcrypt hash generator - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: bcrypt hash generator (/thread-11533.html)



bcrypt hash generator - blaster666 - 08-02-2023

I am going to test some hashcat , and I decided to get hashes from online encoders.
But for testing, I need information to be correct.

I could easily find online md5 encryptor, and seems like it is working correct. 
But for bcrypt , it seems not ok, I will attach screenshoot, to explain what I mean. 
Could you advice me any trusted bcrypt encoder, so the pentesting tests will be correct?


RE: bcrypt hash generator - royce - 08-02-2023

(We don't say "encrypting" / "decrypting" when we talk about password hashes - we "hash" them, and then "crack" them)

Not sure why that online hashing tool wouldn't validate - can you actually crack that hash with hashcat?

Other options:

'test.pl' that is distributed with hashcat can hash bcrypt in bulk. It defaults to cost factor 5, but you could tweak the source to increase that. It does require installing a couple of additional Perl modules.

$ echo blah | test.pl passthrough 3200
$2a$05$MRGuLhi2MBKzMRCwKBSxKOlusRYXA6CPIKQUoL0RSTlEFzcD0xRdi

You can also use `htpasswd -bnBC 10 "" [password]`

mdxfind -z works for some hashes, but doesn't appear to work for bcrypt.