Help explain the PBKDF2-HMAC-SHA1 hash-example
#1
Hello.

Can someone explain the last separatorline in the PBKDF2-HMAC-SHA1 hash-example ? I am trying to crack a hash generated by PBKDF2.

sha1:1000:MzU4NTA4MzIzNzA1MDQ=:19ofiY+ahBXhvkDsp0j2ww==

Iknow the MzU4NTA4MzIzNzA1MDQ line is the salted hash in base64 but what is the last line? [u]19ofiY+ahBXhvkDsp0j2ww==[/u]

[u]Kind regards Vadlianof[/u]
Reply
#2
salt in base64
Reply
#3
Thanks for the quick answer!

I used a PBKDF2 generator with the password: abc and salt: test. 
Then it looks like this:

sha1:1000:imirsGNFG+sMgaiy16fwPgWE3rY=:dGVzdA==

When i try to run it i get the error: token length exception, no hashes loaded.

imirsGNFG+sMgaiy16fwPgWE3rY= is the hash i get from the generator and dGVzdA== is the salt: test converted from text to base64. 

Do you know whats wrong here?

Kind regards Vadlianof
Reply
#4
the format is:
sha1:[iteration count]:[salt in base64]:[digest in base64]

therefore the hash is:
sha1:1000:dGVzdA==:imirsGNFG+sMgaiy16fwPgWE3rY=

this can be cracked with:
Code:
hashcat -m 12000 -a 0 -w 3 hash.txt dict.txt

where hash.txt contains the hash(es) and dict.txt contains the passwords
Reply
#5
Thanks for the help guys! Works like a charm!
Reply