08-19-2016, 09:03 PM
(This post was last modified: 08-19-2016, 09:04 PM by norfSprite.)
(08-19-2016, 09:22 AM)atom Wrote: I don't understand anything from this. I think you need to entirely rephrase.
Goal: Be able to recreate the example SCRYPT hash.
I will list the steps/knowledge I assume are needed to be able to recreate the example SCRYPT hash. After which I will go on to explain my current mindset/approach in hope that it will help users be able to see what I am doing wrong/ or what I am missing. After these two sections I will go on to ask questions which I hope can be answered.
1.
-To recreate the example SCRYPT hash I need to know the password and salt that are used.
-I also need to know the work parameters that were used during generation.
2.
-The work parameters are stored in the hash, they are (N=1024, p=1, r=1)
-Cracking the hash spits out the password.
-Cracking the hash with --outfile-format=i for i in (1,3,6,9) does not display the salt.
3.
-The example hash uses a salt correct?
-Why can't/don't I see the salt in any of the various outfile-formats used?
-What programming language and library was used to generate the example SCRYPT hash?