Cracking SHA when I know the salt - is this the right way? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: General Help (https://hashcat.net/forum/forum-8.html) +--- Thread: Cracking SHA when I know the salt - is this the right way? (/thread-4665.html) |
Cracking SHA when I know the salt - is this the right way? - toad - 09-08-2015 I've cracked some hashes and the results looks like this: pass1234 dog1234 banjo1234 etc, So I know that the salt is 1234 appended at the end of the password. Now, I fire up cudaHashCat and enter this: Code: cudaHashCat64.exe -m 110 7xxa1a94xxbe3cxx660xx237ecxxf505804xxdac:1234 Is this the correct way? It doesn't seem to progress - Recovered (0%), Digests (0%), Speed 0h/s. RE: Cracking SHA when I know the salt - is this the right way? - rico - 09-08-2015 You haven't specified an attack mode. If you have a wordlist/dictionary called english.txt (in the same folder as hashcat) use this: Quote:cudaHashCat64.exe -m 110 -a 0 7xxa1a94xxbe3cxx660xx237ecxxf505804xxdac:1234 english.txt RE: Cracking SHA when I know the salt - is this the right way? - FlippingGerman - 09-09-2015 That's what some people think is a good salting method? Oh dear. |