SHA256 w/ Custom Salt - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: SHA256 w/ Custom Salt (/thread-5797.html) |
SHA256 w/ Custom Salt - msf004 - 08-26-2016 I have a hash that was created from CakePHP SimplePasswordHasher class using sha256. This class sets a salt in a cfg file. In my case the salt looks something like this: DYhG93b0qyJfIxfs1guVoUubWwvniR2G0FgaC9mi-aoyioueryiqyeryuwry-allup The hashed password looks something like this: 54800209da18376ee8251f509c112ac13c7cbb9b480e440f9f60cb184999482d I know the actual password, I am simply trying to understand how to have hashcat crack the password using the configured salt. the salt looks encoded to some extent too, which is adding confusion. The salt is setup in a simple config file in the filesystem. I tried throwing the known password into a file (real.password) and the hashed password into a file (hash.password) and running: Code: # hashcat64.bin -m 1410 -a 0 hash.password real.password I also tried appending the salt to the hashed password with a . separator. No luck thus far. Code: WARNING: Hashfile 'hash.password' on line 1 (54800209da18376ee8251f509c112ac13c7cbb9b480e440f9f60cb184999482d.DYhG93b0qyJfIxfs1guVoUubWwvniR2G0FgaC9mi-aoyioueryiqyeryuwry-allup): Separator unmatched ...or... Code: WARNING: Hashfile 'hash.password' on line 1 (54800209da18376ee8251f509c112ac13c7cbb9b480e440f9f60cb184999482d): Line-length exception My assumption is that I am either setting the has incorrectly and/or the hash is in an invalid format. RE: SHA256 w/ Custom Salt - kiara - 08-26-2016 (08-26-2016, 09:04 PM)msf004 Wrote: I have a hash that was created from CakePHP SimplePasswordHasher class using sha256. https://hashcat.net/wiki/doku.php?id=example_hashes and its telling u Separator unmatched 54800209da18376ee8251f509c112ac13c7cbb9b480e440f9f60cb184999482d:DYhG93b0qyJfIxfs1guVoUubWwvniR2G0FgaC9mi-aoyioueryiqyeryuwry-allup RE: SHA256 w/ Custom Salt - msf004 - 08-27-2016 (08-26-2016, 10:46 PM)kiara Wrote: https://hashcat.net/wiki/doku.php?id=example_hashes Thank you for the reply. My error does change when I use the proper separator. However, now my error is: Code: WARNING: Hashfile 'hash.password' on line 1 (54800209da18376ee8251f509c112ac13c7cbb9b480e440f9f60cb184999482d:DYhG93b0qyJfIxfs1guVoUubWwvniR2G0FgaC9mi-aoyioueryiqyeryuwry-allup): Line-length exception It would appear that salt value is too long, maybe? : DYhG93b0qyJfIxfs1guVoUubWwvniR2G0FgaC9mi-aoyioueryiqyeryuwry-allup I have spent a few hours tonight trying to understand how CakePHP hashes/salts the passwords. By what I read it is straight-forward in using sha-256 and applying the salt. However, I cannot get my controlled test to crack the known password. RE: SHA256 w/ Custom Salt - kiara - 08-27-2016 http://book.cakephp.org/3.0/en/core-libraries/security.html#Cake\Utility\Security::decrypt RE: SHA256 w/ Custom Salt - msf004 - 08-27-2016 (08-27-2016, 02:22 PM)kiara Wrote: http://book.cakephp.org/3.0/en/core-libraries/security.html#Cake\Utility\Security::decrypt Thanks - that is the page I have been referencing without success. I cannot figure out if the salt is truly keyed with the cipher in first place. My config file has: Code: /** I have also attempted to write a function to decypher the salt...being the Security::decrypt method is supposed to decrypt strings that have been encrypted with the key: Code: $mysalt = Configure::read('Security.salt'); ...but nothing is returned. Thus, I have not yet figured out if the salt has been encrypted with the key. RE: SHA256 w/ Custom Salt - atom - 08-27-2016 https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_is_the_maximum_supported_salt_length RE: SHA256 w/ Custom Salt - msf004 - 08-27-2016 (08-27-2016, 11:03 PM)atom Wrote: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_is_the_maximum_supported_salt_length Hi Atom, Are you suggesting I request a new feature or were you simply pointing me to the max salt of 31 chars? I am still confused if 'DYhG93b0qyJfIxfs1guVoUubWwvniR2G0FgaC9mi-aoyioueryiqyeryuwry-allup' is truly the salt that was used. That seems ridiculously long for a salt...but maybe that is the salt that was used. I have not yet figured this out. Thanks, msf004 RE: SHA256 w/ Custom Salt - msf004 - 08-28-2016 SO I ran some tests and I have determined that long string IS the salt. Bummer. RE: SHA256 w/ Custom Salt - atom - 08-28-2016 Right. So the next step would be: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#i_want_to_request_some_new_algorithms_or_features_how_can_i_accomplish_this RE: SHA256 w/ Custom Salt - kiara - 08-28-2016 (08-28-2016, 02:19 AM)msf004 Wrote: SO I ran some tests and I have determined that long string IS the salt. Bummer. try to use hash manager from insidepro , perhaps the salt limit is higher, dont ask me how to use it, i dont know, never tried it |