SHA256($pass.$salt) with long hash - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: SHA256($pass.$salt) with long hash (/thread-5519.html) |
SHA256($pass.$salt) with long hash - webtonull - 06-14-2016 Is it possible to crack a password where the salt is as long as the hash? For SHA256 this would mean having a 32 bit salt. I realize this means that SHA256 needs to run two rounds as the input data (pass+salt) is longer than one block. Currently I'm getting a line exception when i try to use 1400 (with hybrid + mask) or 1410 (sha256($pass.$salt)). |