![]() |
Hashcat can't crack salted MD5? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html) +--- Thread: Hashcat can't crack salted MD5? (/thread-3304.html) |
Hashcat can't crack salted MD5? - djmentos - 04-15-2014 Hello! I would like to crack such a function: md5( md5($salt) . md5($pass) ); Hashcat can't do that, but can: md5( $salt . md5($pass) ); So I think I can manually hash a salt and use this second function (3710). I wanted to test it: pass = 'ola' = 2fe04e524ba40505a82e03a2819429cc salt = 'salt' = ceb20772e0c9d240c75eb26b0e37abee final hash = md5('ceb20772e0c9d240c75eb26b0e37abee2fe04e524ba40505a82e03a2819429cc') = be22622c77c114703627f92c3dd9afb8 I created an input file for hashcat: Quote:# hash : md5(salt) And run it using command: Quote:./hashcat-cli64.bin -m 3710 -a 3 input ?a?a?a There is no result. What am I doing wrong? RE: Hashcat can't crack salted MD5? - atom - 04-15-2014 you're wrong. i guess you want to crack ipb2 or mybb which are the most popular software to use md5( md5($salt) . md5($pass) ); you can simply use -m 2811 to crack it. you can not use -m 3710 because "ceb20772e0c9d240c75eb26b0e37abee2fe04e524ba40505a82e03a2819429cc" is > length 55 and therefore would need to call another transform round which makes the cracking slow. therefore use -m 2811 which is optimized to do this and precomputes md5(salt) in the startup phase once |