08-19-2017, 11:47 AM
(08-19-2017, 11:01 AM)undeath Wrote: have a look at mode 9400/9500/9600
In most cases you cannot simply use the generic implementations to crack something of which you merely know what underlying hashing function is used.
To extract the necessary info from your document use https://github.com/magnumripper/JohnTheR...ce2john.py
Thanks for the answer, but aren't those modes meant for when the entire file is password protected? I believe that protection is different from the simple salted hash protection that I am working with now.
My plan for the current attack is to basically generate a specific dictionary (or use a mask, haven't decided yet) with all the possible combinations of salt+hash, i.e. known salt:?l?l?l (my example password is jim), which should be quite a limited number of possibilities if I can only figure out what hash has actually been used, and how to put it in my hash-file in such a way that hashcat recognizes it.
Does that sound feasible, or have I misunderstood something basic here?