hashcat Forum
Whirlpool + salt? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old hashcat Support (https://hashcat.net/forum/forum-20.html)
+--- Thread: Whirlpool + salt? (/thread-4171.html)



Whirlpool + salt? - chickin - 03-10-2015

Is it possible to crack a whirlpool hash if it has been salted? I have a list of hashes, each with a 5 digit number as a salt. How would I go about cracking this? Is it possible with hashcat?


RE: Whirlpool + salt? - epixoip - 03-10-2015

use -m 6100 and manually add the salt with each attack


RE: Whirlpool + salt? - chickin - 03-10-2015

(03-10-2015, 11:05 AM)epixoip Wrote: use -m 6100 and manually add the salt with each attack

I don't understand though, because they is no option for hash('whirlpool', $pwd.$salt)) - Is it even possible?


RE: Whirlpool + salt? - epixoip - 03-10-2015

Yes, it's possible. I just told you how. Use -m 6100, and manually append the salt with each attack. Treat the salt as part of the password candidate you're attacking.

For example if the salt is '12345' and you wanted to do a len 6 brute force, you'd use -a 3 ?a?a?a?a?a?a12345


RE: Whirlpool + salt? - chickin - 03-10-2015

(03-10-2015, 10:34 PM)epixoip Wrote: Yes, it's possible. I just told you how. Use -m 6100, and manually append the salt with each attack. Treat the salt as part of the password candidate you're attacking.

For example if the salt is '12345' and you wanted to do a len 6 brute force, you'd use -a 3 ?a?a?a?a?a?a12345

D:\cudaHashcat-1.33\cudaHashcat64.exe -m 6100 -a 3 ?a?a?a?a?a?aHi5
ZFZMeGZ -o D:\cudaHashcat-1.33\cracked.txt D:\cudaHashcat-1.33\hash.txt - I guess i'm stupid, because I couldn't get it to work


RE: Whirlpool + salt? - bsec - 03-11-2015

(03-10-2015, 11:18 PM)chickin Wrote:
(03-10-2015, 10:34 PM)epixoip Wrote: Yes, it's possible. I just told you how. Use -m 6100, and manually append the salt with each attack. Treat the salt as part of the password candidate you're attacking.

For example if the salt is '12345' and you wanted to do a len 6 brute force, you'd use -a 3 ?a?a?a?a?a?a12345

D:\cudaHashcat-1.33\cudaHashcat64.exe -m 6100 -a 3 ?a?a?a?a?a?aHi5
ZFZMeGZ -o D:\cudaHashcat-1.33\cracked.txt D:\cudaHashcat-1.33\hash.txt - I guess i'm stupid, because I couldn't get it to work
The syntax is:
hashcat -options hash.txt mask/word(list|dir)
So here, it is:
D:\cudaHashcat-1.33\cudaHashcat64.exe -m 6100 -a 3 -o D:\cudaHashcat-1.33\cracked.txt D:\cudaHashcat-1.33\hash.txt ?a?a?a?a?a?aHi5ZFZMeGZ

You just need to read the wiki or the --help from your cat.