Help explain the PBKDF2-HMAC-SHA1 hash-example - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Help explain the PBKDF2-HMAC-SHA1 hash-example (/thread-8146.html) |
Help explain the PBKDF2-HMAC-SHA1 hash-example - vadlianof - 02-11-2019 Hello. Can someone explain the last separatorline in the PBKDF2-HMAC-SHA1 hash-example ? I am trying to crack a hash generated by PBKDF2. sha1:1000:MzU4NTA4MzIzNzA1MDQ=:19ofiY+ahBXhvkDsp0j2ww== Iknow the MzU4NTA4MzIzNzA1MDQ line is the salted hash in base64 but what is the last line? [u]19ofiY+ahBXhvkDsp0j2ww==[/u] [u]Kind regards Vadlianof[/u] RE: Help explain the PBKDF2-HMAC-SHA1 hash-example - undeath - 02-11-2019 salt in base64 RE: Help explain the PBKDF2-HMAC-SHA1 hash-example - vadlianof - 02-11-2019 Thanks for the quick answer! I used a PBKDF2 generator with the password: abc and salt: test. Then it looks like this: sha1:1000:imirsGNFG+sMgaiy16fwPgWE3rY=:dGVzdA== When i try to run it i get the error: token length exception, no hashes loaded. imirsGNFG+sMgaiy16fwPgWE3rY= is the hash i get from the generator and dGVzdA== is the salt: test converted from text to base64. Do you know whats wrong here? Kind regards Vadlianof RE: Help explain the PBKDF2-HMAC-SHA1 hash-example - philsmd - 02-11-2019 the format is: sha1:[iteration count]:[salt in base64]:[digest in base64] therefore the hash is: sha1:1000:dGVzdA==:imirsGNFG+sMgaiy16fwPgWE3rY= this can be cracked with: Code: hashcat -m 12000 -a 0 -w 3 hash.txt dict.txt where hash.txt contains the hash(es) and dict.txt contains the passwords RE: Help explain the PBKDF2-HMAC-SHA1 hash-example - vadlianof - 02-12-2019 Thanks for the help guys! Works like a charm! |