Problem with SHA256 and hyphenated salt - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: Problem with SHA256 and hyphenated salt (/thread-3540.html) |
Problem with SHA256 and hyphenated salt - nylithic - 07-14-2014 I think I ran into a bug when trying to crack SHA256 hashes with a hyphenated salt. I hashed the following: password11111111-1111-1111-1111-111111111111 the salt is 11111111-1111-1111-1111-111111111111 which produces the following hash: d6b21c5fd4c65673b9660b72fad2ecf6ef0486c659494c601151861a9d2881a3 If I put the hash into oclhashcat as d6b21c5fd4c65673b9660b72fad2ecf6ef0486c659494c601151861a9d2881a3:11111111-1111-1111-1111-111111111111 with the hash-mode set to 1410 it never cracks it. RE: Problem with SHA256 and hyphenated salt - atom - 07-14-2014 not a bug, simply just not supported. max salt length is 32 RE: Problem with SHA256 and hyphenated salt - nylithic - 07-14-2014 ok. i come across salts longer than 32 characters quite a bit. is there a possibility it could be extended to something longer? RE: Problem with SHA256 and hyphenated salt - atom - 07-14-2014 Not in the generic hash types. But if it's an interessting hash and we add it as a new hash-mode it's possible, all lengths RE: Problem with SHA256 and hyphenated salt - nylithic - 07-14-2014 nothing really interesting. i've seen it in a few php cms' where the salt is a uuid. |