hashcat Forum
Help me identify this salted hash? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: General Help (https://hashcat.net/forum/forum-8.html)
+--- Thread: Help me identify this salted hash? (/thread-5050.html)



Help me identify this salted hash? - losira - 01-17-2016

I got it from a MySQL5 database. I am a total novice as this stuff, so I need a bit of help

password: [40 character hash]
salt: [12 characters using letters and symbols like =|%$;]

I'm using cudahashcat and i thought the "MySQL4.1/MySQL5" would be the way to go, but aren't those hashes usually  unsalted?

I also tried to give the hash to onlinehashcrack.com and they were unable to crack it.

I was thinking it would be either: sha1($pass.$salt) sha1($salt.$pass), but I am unsure.

Thanks for the help


RE: Help me identify this salted hash? - Mem5 - 01-17-2016

You cannot use hashcat "MySQL4.1/MySQL5" mode because your hash is salted.

onlinehashcrack.com do not crack Salted Mysql.

You can try one of :
sha1($pass.$salt)
sha1($salt.$pass)
sha1($salt.$pass.$salt)

But the best try is to know how the hash was built, try to read the webapp source code.


RE: Help me identify this salted hash? - losira - 01-18-2016

(01-17-2016, 08:32 PM)Mem5 Wrote: But the best try is to know how the hash was built, try to read the webapp source code.

Sorry, can you elaborate a bit on this? How could this tell me what formula was used?


RE: Help me identify this salted hash? - Mem5 - 01-18-2016

The application builds the hash. If you read the application source code, you will know which algo (mysql, sha1, etc) has been used, and how the salt+hash have been put together ($salt.$pass or $pass.$salt etc)