MD5 salted hashs - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html) +--- Thread: MD5 salted hashs (/thread-3913.html) |
MD5 salted hashs - rsberzerker - 12-22-2014 I've got [mostly] down how to use hashcat (and oclhashcat) on unsalted hashes, so I decided to try something harder, a salted hash. I found a cracked md5alt hash elsewhere and put that, along with the -m 10 example from http://hashcat.net/wiki/doku.php?id=example_hashes into a file, then created a 6 word dictionary with both passwords, including hashcat. However, I fail to find either. The following pruned output: Code: hashcat-cli64.exe -a 0 -m 10 md5salt.hash md5salt.dict It sees the salts, but I don't get any "found" passwords, even though at least one of them *IS* in the dictionary. What am I doing wrong? RE: MD5 salted hashs - epixoip - 12-22-2014 Works for me. Code: epixoip@token:~/hashcat-0.48$ echo '01dfae6e5d4d90d9892622325959afbe:7050461' >testhash Not sure what you're doing wrong. Maybe you have trailing whitespace or something. RE: MD5 salted hashs - rsberzerker - 12-22-2014 (12-22-2014, 04:06 AM)epixoip Wrote: Not sure what you're doing wrong. Maybe you have trailing whitespace or something. OK, partially solved. I did have some whitespace at the end of the hashcat hash. But the other still fails. I tried running it through an MD5 hasher, but can't get the known hash. If the hash is MD5alt, then supposing the salt is M7j and the password is knicky, am I correct that if I MD5(knickyM7j) I should get the hash back, yes? RE: MD5 salted hashs - epixoip - 12-22-2014 Correct. Code: epixoip@token:~/hashcat-0.48$ echo -n 'knickyM7j' | md5sum RE: MD5 salted hashs - rsberzerker - 12-22-2014 That's what I thought. Thanks. If nothing else, I think I finally truly understand salting (as opposed to just being able to define it). |