multihashing of sha1($salt.$pass) possible? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html) +--- Forum: Very old oclHashcat Support (https://hashcat.net/forum/forum-21.html) +--- Thread: multihashing of sha1($salt.$pass) possible? (/thread-231.html) |
multihashing of sha1($salt.$pass) possible? - randyberger - 12-27-2010 Hi,I'm new to this so a simple answer will be helpful I want to use this command: Code: oclHashcat.exe sha1.hash -1 ?d?d ?1?1?1?1?1 ?1?1?1?1?1?1 -m 102 where: sha1.hash is something like this: Code: 22E674C15D2DA3C80125CCF661A82BF0F59EDC82:00000000001234567890123400 and so on,list must have 8x10000 hashes(same 8 hashes with different value inside $salt(the value is some digit in range 0-9999 in hex)! The target is to obtain 11-digit pass! 10x for info RE: multihashing of sha1($salt.$pass) possible? - mastercracker - 12-27-2010 Yes, I am pretty sure it is feasible. The question is why you did not try it instead and/or what problem did you get? I suggest also you modify your order of ?1 and put it like this: ?1?1?1?1?1?1?1?1 ?1?1?1 It's better to have a multiple of 4 in the left section. RE: multihashing of sha1($salt.$pass) possible? - randyberger - 12-27-2010 (12-27-2010, 04:23 AM)mastercracker Wrote: Yes, I am pretty sure it is feasible. The question is why you did not try it instead and/or what problem did you get? 10x for your replay! First,before i try the above,i must receive one valid hashalt with password(must happen this days),so can be able to see if the command works or not in some good time-frame,else I'll have to wait with days(80000*10^11 combinations are a lot of computing time)before eventually receive conformation is it correct or not.Also generating a file with those hashalt variables are too much time also for me,because I don't have the knowledge to make some script who will generate it for me at this time!Maybe someone here will help me with this script,maybe not EDIT:Maybe I do all wrong for example here is command line for ighashgpu,off course with only one hash,coz ighashgpu does not support multihashing for sha1: ighashgpu.exe -hm:0 /tha1 /min:11 /max:11 /uh:00010203040506070809 /salt:0405040200XXXXXXXXXXXXXX00 /h:22E674C15D2DA3C80125CCF661A82BF0F59EDC82 for info: green text X in salt is value that i know by default; red text are the values from 0-9999 in HEX(in my case the number is 4542).I must try them until i get match witch will lead me to my 11digit code orange is my hash(i can get 8 hashes). So I want to crack simultaneously with those 8 hashes do decrease the time maybe x8 times.If any of these hashes match I'll have my password. How can I do that? BR RE: multihashing of sha1($salt.$pass) possible? - randyberger - 12-29-2010 Updating info..... So here is correct pair of pass,salt and hash: tested with this cmd Code: ighashgpu.exe /t:sha1 /min:11 /max:11 /uh:00010203040506070809 /salt:07070902003543010412367400 /h:07381fe21f9a4e56740ee3162a7c06e6aad15493 I can not reproduce the result in oclHASHcat,don't know why...this is the command i used: Code: oclHashcat.exe hash.hash -1 ?d?d ?1?1?1?1?1?1 ?1?1?1?1?1 -m 102 in hash.hash file i have only one line: Code: 07381fe21f9a4e56740ee3162a7c06e6aad15493:07070902003543010412367400 Code: pass:0709010007050508040804(in hex) or 79107558484 here is initial data that i know: Code: 354301041236740 So..cracking all hashes will lead me to same(or other but still useful) 11-digit password! About salt( here is the key ).... salt:07070902003543010412367400 where: random_number _from_00000000-09090909 in hex (0-9999) in my example 07070902 in hex(7792) 00 - zero byte initial_data in my example 35430104123674 00-zero byte The target:I must try one hash with salt that has changing random_number _from_00000000-09090909 until i find password 11-digit(22 in HEX) Every hash has different random_number(in other words different salt) but leads to the same (maybe different but still usable) 11-digit password(not proved yet)! How to test all 8 hashes simultaneously with current salt is my question??!!!Because 1st match will give me my password!!!Also how to organize all things together.... 10x again for contribution! RE: multihashing of sha1($salt.$pass) possible? - atom - 12-29-2010 sorry, but this does not work with oclHashcat for two reasons: 1. you can not add salts or charsets in hex 2. you can not crack plains of size 15 or bigger and you need 24 RE: multihashing of sha1($salt.$pass) possible? - atom - 01-21-2011 multihashing of sha1($salt.$pass) is (and was) possible but the reasons why sl3 unlocking with oclHashcat is not possible still remain the same even with the latest version. RE: multihashing of sha1($salt.$pass) possible? - atom - 01-31-2011 support for salted hex and salted charsets comes in oclHashcat v0.26 |