How to crack custom hash - SHA512, SHA256, and MD5 combined - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: How to crack custom hash - SHA512, SHA256, and MD5 combined (/thread-7924.html) |
How to crack custom hash - SHA512, SHA256, and MD5 combined - therealpaulgg - 11-04-2018 Hi, I am trying to figure out how to use hashcat to crack a custom hash function. The hash I have has been hashed several hundred times in MD5, then in SHA256, etc. How could I tell Hashcat to do a custom hash function like this? I haven't seen much information about how to do this online. By the way, each iteration uses a standard hash function with no salt. RE: How to crack custom hash - SHA512, SHA256, and MD5 combined - undeath - 11-04-2018 You'd have to write your own kernel for that. RE: How to crack custom hash - SHA512, SHA256, and MD5 combined - therealpaulgg - 11-05-2018 How would you suggest going about cracking something like this then? My python script is just too slow for this brute forcing, and dict. attack with the rockyou list hasn't gotten me anywhere RE: How to crack custom hash - SHA512, SHA256, and MD5 combined - royce - 11-11-2018 John the Ripper has a way to express custom hashes, but I'm not sure that it would support hundreds of them nested. MDXfind's -i flag can be used to iterate hundreds of times, but only for a given hash type. Hundreds of one hash, followed by hundreds of another hash, wouldn't be supported directly. But you might be able to do it by cracking the first phase, and then piping the results to the second phase, etc. But this would all be CPU-only. |