hashcat Forum
Cracking md5(md5($pass.$salt).$salt) - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html)
+--- Thread: Cracking md5(md5($pass.$salt).$salt) (/thread-3561.html)



Cracking md5(md5($pass.$salt).$salt) - cmouse - 07-23-2014

Is there a way to crack these kind of passwords or does it require a feature request?


RE: Cracking md5(md5($pass.$salt).$salt) - cmouse - 07-23-2014

Also, what is the syntax of input while if these two salts are different. Basically this is about postgresql authentication protocol which uses hashes of format

MD5(MD5(password || user) || per-connection salt)


RE: Cracking md5(md5($pass.$salt).$salt) - atom - 07-25-2014

yeah, due to the per-connection salt speciality it requires a new hash-mode and therefore you need to create a feature request on hashcat's trac


RE: Cracking md5(md5($pass.$salt).$salt) - cmouse - 08-03-2014

Thank you, created new ticket https://hashcat.net/trac/ticket/490