|
MD5 salted hashs - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html) +--- Thread: MD5 salted hashs (/thread-3913.html) |
MD5 salted hashs - rsberzerker - 12-22-2014 I've got [mostly] down how to use hashcat (and oclhashcat) on unsalted hashes, so I decided to try something harder, a salted hash. I found a cracked md5 alt hash elsewhere and put that, along with the -m 10 example from http://hashcat.net/wiki/doku.php?id=example_hashes into a file, then created a 6 word dictionary with both passwords, including hashcat. However, I fail to find either. The following pruned output:Code: hashcat-cli64.exe -a 0 -m 10 md5salt.hash md5salt.dictIt sees the salts, but I don't get any "found" passwords, even though at least one of them *IS* in the dictionary. What am I doing wrong? RE: MD5 salted hashs - epixoip - 12-22-2014 Works for me. Code: epixoip@token:~/hashcat-0.48$ echo '01dfae6e5d4d90d9892622325959afbe:7050461' >testhashNot sure what you're doing wrong. Maybe you have trailing whitespace or something. RE: MD5 salted hashs - rsberzerker - 12-22-2014 (12-22-2014, 04:06 AM)epixoip Wrote: Not sure what you're doing wrong. Maybe you have trailing whitespace or something. OK, partially solved. I did have some whitespace at the end of the hashcat hash. But the other still fails. I tried running it through an MD5 hasher, but can't get the known hash. If the hash is MD5 alt, then supposing the salt is M7j and the password is knicky, am I correct that if I MD5(knickyM7j) I should get the hash back, yes?
RE: MD5 salted hashs - epixoip - 12-22-2014 Correct. Code: epixoip@token:~/hashcat-0.48$ echo -n 'knickyM7j' | md5sumRE: MD5 salted hashs - rsberzerker - 12-22-2014 That's what I thought. Thanks. If nothing else, I think I finally truly understand salting (as opposed to just being able to define it). |