Cracking Hash with Known Plaintext - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: Cracking Hash with Known Plaintext (/thread-3281.html) |
Cracking Hash with Known Plaintext - synick - 04-04-2014 Hi All, I have been looking around for a while and cannot seem to find the answer. If I have a hash, know the plaintext. How can I crack the salt? I am trying to determine if the rest of the application is using common salts or they are unique. Thanks. RE: Cracking Hash with Known Plaintext - radix - 04-04-2014 assuming the hash has a salt, you could use mask processor to make a salt list and then use cpu hashcat with -e. however, its unlikely you will find it unless its simple. RE: Cracking Hash with Known Plaintext - epixoip - 04-05-2014 depending on the algorithm, you could simply reverse the role of the password and the salt. for example, if the algorithm is md5(s.p), you could use the password as the salt and crack it as md5(p.s). |