How to handle masked passwords in input parameters? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Developer (https://hashcat.net/forum/forum-39.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-40.html) +--- Thread: How to handle masked passwords in input parameters? (/thread-12441.html) |
How to handle masked passwords in input parameters? - gitc - 12-29-2024 For example, the following command hashcat -m 0 ee89223a2bXXXXXXXX132ed77abbcc79 -a 3 ?h?h?h?h?h?h?h?h?h?h?h?h I need to perform SHA-256 hashing on each generated candidate password, and then the candidate password should proceed to the original program process the original process: ?h?h?h?h?h?h?h?h?h?h?h?h candidate password: 124a4e6fa21a md5(124a4e6fa21a) COMPARE( md5(124a4e6fa21a) ee89223a2bXXXXXXXX132ed77abbcc79 ) my requirements ?h?h?h?h?h?h?h?h?h?h?h?h candidate password: 124a4e6fa21a md5(124a4e6fa21a) SHA-256( md5(124a4e6fa21a) ) COMPARE( SHA-256( md5(124a4e6fa21a) ) , ee89223a2bXXXXXXXX132ed77abbcc79 ) I tried to handle this in the function, but actually, the candidate passwords generated by this function do not affect the computation result RE: How to handle masked passwords in input parameters? - DanielG - 12-30-2024 You need a different hashcat mode, not -m 0 but -m 20800. See https://hashcat.net/wiki/doku.php?id=example_hashes 20800 sha256(md5($pass)) 74ee1fae245edd6f27bf36efc3604942479fceefbadab5dc5c0b538c196eb0f1 |