Password length - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Password length (/thread-6488.html) |
Password length - gokahash - 04-18-2017 Hi to all! I tried to crack hash sha256($salt.$pass) but can't find a password the string is: supportteam@gmail.com:supportteam:[$pass]:14232934857 hash is 97xxxx7147e3f4342a50f2a46xxxxxx8758036569d229482474b59b1xxxx633f password is 1234567890 There is no algoritm sha256($salt1.$pass.$salt2), so I run hashcat as mask attack and password is ?d?d?d?d?d?d?d?d?d?d:14232934857 Code: hashcat64.exe -d 1 -m 1420 -a 3 97xxxx7147e3f4342a50f2a46xxxxxx8758036569d229482474b59b1xxxx633f:supportteam@gmail.com:supportteam: ?d?d?d?d?d?d?d?d?d?d:14232934857 but if password is 123456789 and hash is 1101xxxx1cf907f82ca71a14caxxxxxxdd5712a9ac15bbbd6b9831c0xxxxxxed than I can find a password! Code: hashcat64.exe -d 1 -m 1420 -a 3 1101xxxx1cf907f82ca71a14caxxxxxxdd5712a9ac15bbbd6b9831c0xxxxxxed:supportteam@gmail.com:supportteam: ?d?d?d?d?d?d?d?d?d:14232934857 I has understood that the maximum supported password length is 55 characters, but how to crack hashes like this? The string may have a 50-80 characters long. Password is 10 or more characters length and generated with small letters, uppercase and digits, so slow dictionary attack on CPU with HM is not working. (HM supported 55 characters password length and 64 characters salt length) Help please. Have any suggestions? Sorry my English and have a good day! ;) [edited by philsmd: do not post hashes!] |