Any way to tackle md5(md5($password).$salt)?
#1
Hi all,
I've checked that Wiki and found that Oclhashcat-plus only supports md5(md5($salt).$password). Is there any solution to md5(md5($password).$salt)? If not, is it possible to add this feature in the next release?

Thanks.
#2
It is already supporting it, its vbull.
#3
(11-08-2012, 10:15 AM)atom Wrote: It is already supporting it, its vbull.

I just check http://hashcat.net/wiki/doku.php?id=supported_psa and it doesn't shows the difference between 2611 and 2711. I'll try both.

Another question is that if I have a hash d164aac6b59de770088899f144f9587d and it's salt is 123456. What kind of input format should I feed to oclHashcat-plus?

something like this?
d164aac6b59de770088899f144f9587d:123456


Thank you.
#4
oclHashcat-plus v0.09 supports only 3-char and 30-char salts, not 6 char. You have to wait for oclHashcat-plus v0.10.
#5
I see. Sad Hopefully, we can have 0.10 in the near future. Smile
#6
ukyang, the format is like you wrote Hash:Salt. If your hash is really Vbulletin then your salt is probably in hex format. You have to use -m 2611 (for Vbulletin with 3 characters salt) and the switch --hex-salt
and it should work.
#7
(11-08-2012, 01:22 PM)mastercracker Wrote: ukyang, the format is like you wrote Hash:Salt. If your hash is really Vbulletin then your salt is probably in hex format. You have to use -m 2611 (for Vbulletin with 3 characters salt) and the switch --hex-salt
and it should work.
Thank for the reply. Unfortunately, this kind of hashing function is used in the forum system "discuz", which is extremely popular in Mainland China, HongKong and Taiwan. So I can only hope that this function will be added into next release.