hashcat Forum
Help with cracking - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html)
+--- Forum: General Help (https://hashcat.net/forum/forum-8.html)
+--- Thread: Help with cracking (/thread-5541.html)



Help with cracking - 7461342 - 06-24-2016

I’m taking a class where we generated passwords and salts with python using the following code:


Code:
#!/usr/bin/python

from hashlib import *
import binascii

salt = '3d10c0082e0a2f7d'
pw = 'cat'

salt = binascii.unhexlify(salt)

m = md5(salt)
m.update(pw)

s = sha1(salt)
s.update(m.digest())
s.update(pw)

print s.hexdigest()
print pw
print "----\n"


In my file, I have

user:<salt>:<hash>

I’ve attempted to crack these but I’m running into problems with them.  What I tried to do is take a dictionary list, run the list into the pw variable and compare the outputted hash with the hash in the password file.  This worked for like 2 passwords and then that’s all.  

I was wondering if HashCat would be able to crack something like these…

Thanks!


RE: Help with cracking - atom - 06-25-2016

Yes, but you need a custom kernel for this custom algo