Tri-MD5 Decrypting - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: Tri-MD5 Decrypting (/thread-4954.html) |
Tri-MD5 Decrypting - thejimmy - 01-01-2016 Sorry if this should be in another place but I'm using cudahashcat and this seemed like the most appropriate forum. My problem is rather specific. I am trying to crack an MD5 hash but the problem is that it contains multiple hashes. The full formula is Code: md5(md5(value):salt:md5(value)) Does anyone know the best way to approach this? I know the variables for everything inside the hash (except the original passphrase) I just don't know how to do this since in the mode I can only see md5($salt.md5($pass)). Thanks RE: Tri-MD5 Decrypting - stepMode - 01-06-2016 So if I get this formula right you have a md5 hash that you can crack with hashcat. the "plaintext" after cracking would be 2 md5 hashes + a salt in the middle. Since we know the length of a md5 hash you could start cracking the first 32 chars and the last 32 chars. As I said, not sure if this is right or if its what you asked for. But I'm 100% sure that this is not the fastest way. RE: Tri-MD5 Decrypting - atom - 01-06-2016 Forget that, you can't BF 16^64. The only way is to add the scheme to oclHashcat directly, but there are some requirements. Check out this article: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#i_want_to_request_some_new_algorithms_or_features_how_can_i_accomplish_this |