md5($salt1,password,$salt2) ? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: md5($salt1,password,$salt2) ? (/thread-7938.html) |
md5($salt1,password,$salt2) ? - erikass - 11-09-2018 I want to crack like that but i didnt see any option in hashcat do you help me guys? RE: md5($salt1,password,$salt2) ? - undeath - 11-09-2018 Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule. RE: md5($salt1,password,$salt2) ? - erikass - 11-09-2018 (11-09-2018, 12:20 PM)undeath Wrote: Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule. Please can u give an example ? i'm new at cracking stuff This is function of javascript ** function doLogin() { document.sendin.username.value = document.login.username.value; document.sendin.password.value = hexMD5('\103' + document.login.password.value + '\023\057\006\061\107\252\031\022\337\206\115\266\027\310\002\117'); document.sendin.submit(); return false; ** RE: md5($salt1,password,$salt2) ? - erikass - 11-09-2018 i got it i'm trying attack with mask-bruteforce but i cant add "\" to mask it doesnt crack example hashcat -a ..... \125?d?d?d?d its giving wrong plain i guess? but for example /125?d?d?d that is working RE: md5($salt1,password,$salt2) ? - erikass - 11-10-2018 I solved it solution : i changed linux OS to windows and its worked RE: md5($salt1,password,$salt2) ? - royce - 11-11-2018 That should be irrelevant. Only how special characters (like "?") are escaped on the OS-native command line (not a hashcat issue) should vary between the platforms. |