Help with cracking - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: General Help (https://hashcat.net/forum/forum-8.html) +--- Thread: Help with cracking (/thread-5541.html) |
Help with cracking - 7461342 - 06-24-2016 I’m taking a class where we generated passwords and salts with python using the following code: Code: #!/usr/bin/python In my file, I have user:<salt>:<hash> I’ve attempted to crack these but I’m running into problems with them. What I tried to do is take a dictionary list, run the list into the pw variable and compare the outputted hash with the hash in the password file. This worked for like 2 passwords and then that’s all. I was wondering if HashCat would be able to crack something like these… Thanks! RE: Help with cracking - atom - 06-25-2016 Yes, but you need a custom kernel for this custom algo |