hashcat Forum
How to handle masked passwords in input parameters? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Developer (https://hashcat.net/forum/forum-39.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-40.html)
+--- Thread: How to handle masked passwords in input parameters? (/thread-12441.html)



How to handle masked passwords in input parameters? - gitc - 12-29-2024

For example, the following command

hashcat -m 0 ee89223a2bXXXXXXXX132ed77abbcc79 -a 3 ?h?h?h?h?h?h?h?h?h?h?h?h

I need to perform SHA-256 hashing on each generated candidate password, and then the candidate password should proceed to the original program process


the original process:
?h?h?h?h?h?h?h?h?h?h?h?h
candidate password:  124a4e6fa21a
md5(124a4e6fa21a)
COMPARE(  md5(124a4e6fa21a)  ee89223a2bXXXXXXXX132ed77abbcc79     )


my requirements
?h?h?h?h?h?h?h?h?h?h?h?h
candidate password:  124a4e6fa21a
md5(124a4e6fa21a)
SHA-256(  md5(124a4e6fa21a)  )
COMPARE(  SHA-256(  md5(124a4e6fa21a)  )  ,  ee89223a2bXXXXXXXX132ed77abbcc79     )


I tried to handle this in the function, but actually, the candidate passwords generated by this function do not affect the computation result


RE: How to handle masked passwords in input parameters? - DanielG - 12-30-2024

You need a different hashcat mode, not -m 0 but -m 20800.
See https://hashcat.net/wiki/doku.php?id=example_hashes

20800 sha256(md5($pass)) 74ee1fae245edd6f27bf36efc3604942479fceefbadab5dc5c0b538c196eb0f1