Cracking salted md5 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: Cracking salted md5 (/thread-3374.html) |
Cracking salted md5 - ner0 - 05-11-2014 Hello there, I'm trying to crack a salted md5 password, but I haven't been able to figure it out from the wiki or the command-line help. I wanted to ask you for some help on how to get started. Btw, I'm using cudaHashcat v1.20 So, basically I have an MD5 hash which has been generated using a salt. I know the salt, not the password (obviously). The MD5 generation process is like this $salt = "username:magic word:"; md5($salt.$password); At this point I don't know how to give the salt to Hashcat so that it takes it into account. This is the command I'm using at the moment: cudaHashcat64.exe -t 20 -a 3 --outfile=testresult.txt --outfile-format=3 myhash.hash ?a The hashfile only contains the MD5, where do I put the salt string? Also, is it a problem that the salt itself includes strings like ":" ? My command line is probably way off apart from the attack and hashing type. Would you please advise me? Thanks! RE: Cracking salted md5 - undeath - 05-11-2014 format is hashalt how the salt looks like doesn't matter RE: Cracking salted md5 - ner0 - 05-11-2014 (05-11-2014, 10:58 PM)undeath Wrote: format is hash:salt OK, thanks. I was making a mistake in the command line, now it works, like this: cudaHashcat64.exe -m20 -a3 --outfile=testresult.txt --outfile-format=3 43872066edb7339fdf8ff53acdca2d37:username:some word: |