hashcat Forum
md5($salt1,password,$salt2) ? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: md5($salt1,password,$salt2) ? (/thread-7938.html)



md5($salt1,password,$salt2) ? - erikass - 11-09-2018

I want to crack like that but i didnt see any option in hashcat

do you help me guys?


RE: md5($salt1,password,$salt2) ? - undeath - 11-09-2018

Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule.


RE: md5($salt1,password,$salt2) ? - erikass - 11-09-2018

(11-09-2018, 12:20 PM)undeath Wrote: Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule.

Please can u give an example ? 

i'm new at cracking stuff Sad

This is function of javascript

**
function doLogin() {
document.sendin.username.value = document.login.username.value;
document.sendin.password.value = hexMD5('\103' + document.login.password.value + '\023\057\006\061\107\252\031\022\337\206\115\266\027\310\002\117');
document.sendin.submit();
return false;

**


RE: md5($salt1,password,$salt2) ? - erikass - 11-09-2018

i got it

i'm trying attack with mask-bruteforce but i cant add "\" to mask it doesnt crack

example hashcat -a ..... \125?d?d?d?d its giving wrong plain i guess?


but for example /125?d?d?d that is working


RE: md5($salt1,password,$salt2) ? - erikass - 11-10-2018

I solved it

solution : i changed linux OS to windows and its worked


RE: md5($salt1,password,$salt2) ? - royce - 11-11-2018

That should be irrelevant. Only how special characters (like "?") are escaped on the OS-native command line (not a hashcat issue) should vary between the platforms.