Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: md5 bruteforce with 2 known salts
Post: RE: md5 bruteforce with 2 known salts

undeath Wrote: (12-17-2020, 01:37 AM) -- Did you only measure that speed with the first mask in your list or also with longer ones? Masks with only few variable chars will always produce low performa...
AlanGomes_ hashcat 6 12,461 12-17-2020, 01:39 AM
    Thread: md5 bruteforce with 2 known salts
Post: RE: md5 bruteforce with 2 known salts

undeath Wrote: (12-17-2020, 01:26 AM) -- You already posted the workaround in your first post: append the second salt to your mask. -- It works but the problem remains the same, the performance is ...
AlanGomes_ hashcat 6 12,461 12-17-2020, 01:30 AM
    Thread: md5 bruteforce with 2 known salts
Post: RE: md5 bruteforce with 2 known salts

undeath Wrote: (12-17-2020, 01:05 AM) -- Use mode 20 (md5($salt.$pass)) for good performance. Never use --force. -- Mode 20 only supports 1 salt as far as I know, is there some workaround to add ano...
AlanGomes_ hashcat 6 12,461 12-17-2020, 01:07 AM
    Thread: md5 bruteforce with 2 known salts
Post: md5 bruteforce with 2 known salts

Given a known left salt and right salt, how can I bruteforce a md5 hash with a unknown password between them? For example: md5($salt1 . $password . $salt2) $salt1 is known $salt2 is known too ...
AlanGomes_ hashcat 6 12,461 12-17-2020, 12:57 AM