hashcat Forum
Cracking SHA when I know the salt - is this the right way? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: General Help (https://hashcat.net/forum/forum-8.html)
+--- Thread: Cracking SHA when I know the salt - is this the right way? (/thread-4665.html)



Cracking SHA when I know the salt - is this the right way? - toad - 09-08-2015

I've cracked some hashes and the results looks like this:
pass1234
dog1234
banjo1234
etc,
So I know that the salt is 1234 appended at the end of the password.
Now, I fire up cudaHashCat and enter this:
Code:
cudaHashCat64.exe -m 110 7xxa1a94xxbe3cxx660xx237ecxxf505804xxdac:1234

Is this the correct way? It doesn't seem to progress - Recovered (0%), Digests (0%), Speed 0h/s.


RE: Cracking SHA when I know the salt - is this the right way? - rico - 09-08-2015

You haven't specified an attack mode. If you have a wordlist/dictionary called english.txt (in the same folder as hashcat) use this:

Quote:cudaHashCat64.exe -m 110 -a 0 7xxa1a94xxbe3cxx660xx237ecxxf505804xxdac:1234 english.txt



RE: Cracking SHA when I know the salt - is this the right way? - FlippingGerman - 09-09-2015

That's what some people think is a good salting method? Oh dear.