08-18-2016, 11:24 PM
(This post was last modified: 08-18-2016, 11:24 PM by norfSprite.)
So I think I demonstrate my understanding of the composition of the last two segments below, but I am still stuck attempting to recreate the example hash.
Salt length (20 bytes, b64encoded format) --> ((20 / 4) * 3) - 2 = 13 byte long salt in binary format.
(-2 for the padding bytes '=')
Key length (44 bytes, b64 encoded format) --> ((44/4) * 3) - 1 = 32 byte long key in binary format.
(again -1 for the padding byte '=')
After cracking it in various formats I haven't been able to deduce what the salt is... is it possible that the salt was generated from /dev/urandom and lucky enough to get all non-printable ASCII chars?
I have tried various Outfile formats:
?Is it acceptable to display the results of example Hashes?
1 = hash[:salt]
3 = hash[:salt]:plain
6 = plain:hex_plain
9 = hash[:salt]:crackpos
Reference Resources:
https://blogs.oracle.com/rammenon/entry/..._explained
http://stackoverflow.com/questions/13378...alculation
Salt length (20 bytes, b64encoded format) --> ((20 / 4) * 3) - 2 = 13 byte long salt in binary format.
(-2 for the padding bytes '=')
Key length (44 bytes, b64 encoded format) --> ((44/4) * 3) - 1 = 32 byte long key in binary format.
(again -1 for the padding byte '=')
After cracking it in various formats I haven't been able to deduce what the salt is... is it possible that the salt was generated from /dev/urandom and lucky enough to get all non-printable ASCII chars?
I have tried various Outfile formats:
?Is it acceptable to display the results of example Hashes?
1 = hash[:salt]
3 = hash[:salt]:plain
6 = plain:hex_plain
9 = hash[:salt]:crackpos
Reference Resources:
https://blogs.oracle.com/rammenon/entry/..._explained
http://stackoverflow.com/questions/13378...alculation