hashcat Forum
Help explain the PBKDF2-HMAC-SHA1 hash-example - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Help explain the PBKDF2-HMAC-SHA1 hash-example (/thread-8146.html)



Help explain the PBKDF2-HMAC-SHA1 hash-example - vadlianof - 02-11-2019

Hello.

Can someone explain the last separatorline in the PBKDF2-HMAC-SHA1 hash-example ? I am trying to crack a hash generated by PBKDF2.

sha1:1000:MzU4NTA4MzIzNzA1MDQ=:19ofiY+ahBXhvkDsp0j2ww==

Iknow the MzU4NTA4MzIzNzA1MDQ line is the salted hash in base64 but what is the last line? [u]19ofiY+ahBXhvkDsp0j2ww==[/u]

[u]Kind regards Vadlianof[/u]


RE: Help explain the PBKDF2-HMAC-SHA1 hash-example - undeath - 02-11-2019

salt in base64


RE: Help explain the PBKDF2-HMAC-SHA1 hash-example - vadlianof - 02-11-2019

Thanks for the quick answer!

I used a PBKDF2 generator with the password: abc and salt: test. 
Then it looks like this:

sha1:1000:imirsGNFG+sMgaiy16fwPgWE3rY=:dGVzdA==

When i try to run it i get the error: token length exception, no hashes loaded.

imirsGNFG+sMgaiy16fwPgWE3rY= is the hash i get from the generator and dGVzdA== is the salt: test converted from text to base64. 

Do you know whats wrong here?

Kind regards Vadlianof


RE: Help explain the PBKDF2-HMAC-SHA1 hash-example - philsmd - 02-11-2019

the format is:
sha1:[iteration count]:[salt in base64]:[digest in base64]

therefore the hash is:
sha1:1000:dGVzdA==:imirsGNFG+sMgaiy16fwPgWE3rY=

this can be cracked with:
Code:
hashcat -m 12000 -a 0 -w 3 hash.txt dict.txt

where hash.txt contains the hash(es) and dict.txt contains the passwords


RE: Help explain the PBKDF2-HMAC-SHA1 hash-example - vadlianof - 02-12-2019

Thanks for the help guys! Works like a charm!