hashcat Forum
SHA256($pass.$salt) with long hash - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html)
+--- Thread: SHA256($pass.$salt) with long hash (/thread-5519.html)



SHA256($pass.$salt) with long hash - webtonull - 06-14-2016

Is it possible to crack a password where the salt is as long as the hash? For SHA256 this would mean having a 32 bit salt.

I realize this means that SHA256 needs to run two rounds as the input data (pass+salt) is longer than one block.

Currently I'm getting a line exception when i try to use 1400 (with hybrid + mask) or 1410 (sha256($pass.$salt)).