hashcat Forum
Cracking salted md5 - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html)
+--- Thread: Cracking salted md5 (/thread-3374.html)



Cracking salted md5 - ner0 - 05-11-2014

Hello there,

I'm trying to crack a salted md5 password, but I haven't been able to figure it out from the wiki or the command-line help. I wanted to ask you for some help on how to get started. Btw, I'm using cudaHashcat v1.20

So, basically I have an MD5 hash which has been generated using a salt. I know the salt, not the password (obviously).

The MD5 generation process is like this
$salt = "username:magic word:";
md5($salt.$password);

At this point I don't know how to give the salt to Hashcat so that it takes it into account.

This is the command I'm using at the moment:
cudaHashcat64.exe -t 20 -a 3 --outfile=testresult.txt --outfile-format=3 myhash.hash ?a

The hashfile only contains the MD5, where do I put the salt string?
Also, is it a problem that the salt itself includes strings like ":" ?

My command line is probably way off apart from the attack and hashing type. Would you please advise me?

Thanks!


RE: Cracking salted md5 - undeath - 05-11-2014

format is hashConfusedalt

how the salt looks like doesn't matter


RE: Cracking salted md5 - ner0 - 05-11-2014

(05-11-2014, 10:58 PM)undeath Wrote: format is hash:salt

how the salt looks like doesn't matter

OK, thanks.
I was making a mistake in the command line, now it works, like this:
cudaHashcat64.exe -m20 -a3 --outfile=testresult.txt --outfile-format=3 43872066edb7339fdf8ff53acdca2d37:username:some word: