PBKDF2 HMAC SHA512 - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: PBKDF2 HMAC SHA512 (/thread-4864.html) |
PBKDF2 HMAC SHA512 - thehappygamer108 - 12-01-2015 Hi, I am currently trying to test my password encryption (PBKDF2 HMAC SHA512) and are having an issue trying to crack a simple password. I can’t seem to get oclHashCat V1. 37 to work. This is the first time I have used this application and not sure if I‘m using it correctly or have correct configuration. Can someone shed some light my way please. Password: MyPassword12345 Encrypted password : U****/DAqx****qHgl***7YVY******AM4******BWs= Salt: mvO24idgW2UViAUi7Beufg== Iterations : 5000 The configuration being used is cudaHashcat64.exe -m 12100 <HASHES FILE> < DICTIONARY FILE> The Hashes file contains sha512:5000:U****/DAqx****qHgl***7YVY******AM4******BWs=:mvO24idgW2UViAUi7Beufg== Thanks RE: PBKDF2 HMAC SHA512 - wrigglingears - 12-01-2015 What is the problem exactly? You're just putting information without stating what your issue is, or what the expected output is, or what your actual output is. We can't help here if we don't know what you're asking. And please read through the forum rules. No posting of hashes unless explicitly asked to by the mods or admins. RE: PBKDF2 HMAC SHA512 - thehappygamer108 - 12-01-2015 (12-01-2015, 05:34 PM)wrigglingears Wrote: What is the problem exactly? You're just putting information without stating what your issue is, or what the expected output is, or what your actual output is. We can't help here if we don't know what you're asking. Hi, The problem is that i am unable to get the password, even though its in my dictionary. RE: PBKDF2 HMAC SHA512 - undeath - 12-01-2015 hashcat has no generic pbkdf2 implementation. You can try getting your hash into grub2 format. RE: PBKDF2 HMAC SHA512 - wrigglingears - 12-01-2015 1) There is no such hash mode as -m 12100, check the wiki for the list of hashes that hashcat can deal with. 2) You should specify -a 0 for a dictionary attack. Even though the default is -a 0, it is still good to specify in order to have consistency. 2) Please remove or at least partially obscure the actual hash. Posting the full hash can get you banned from the forums. RE: PBKDF2 HMAC SHA512 - philsmd - 12-01-2015 @wrigglingears, @undeath: why are you both claiming that there are no generic PBKDF2-HMAC-* hashing algorithms implemented ? It is both stated here https://hashcat.net/forum/thread-4614.html and here https://hashcat.net/wiki/doku.php?id=example_hashes that PBKDF2-HMAC-MD5, PBKDF2-HMAC-SHA1, PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-SHA512 are supported by oclHashcat. @thehappygamer108 how did you generate those hashes? are you sure they are generated correctly? It doesn't seem the case (the hash doesn't match to the iteration, salt, password you mentioned). Please verify that iteration number, salt and password are correct and the hash is correctly generated. RE: PBKDF2 HMAC SHA512 - undeath - 12-01-2015 thanks philsmd. I should update every once in a while. RE: PBKDF2 HMAC SHA512 - wrigglingears - 12-01-2015 Oh my bad, I was referencing another page in the wiki https://hashcat.net/wiki/doku.php?id=oclhashcat Guess that needs to be updated then. |