05-04-2020, 07:06 PM
This seems to be similar to:
-m 4520 = sha1($salt.sha1($pass))
-m 4521 = Redmine
-m 4522 = PunBB
but with the $salt at the end instead of at the beginning (all of the above use the salt at the start).
Yeah, I don't think it's currently supported and it could make sense to request it on github.
... but don't forget to follow this rules: https://hashcat.net/wiki/doku.php?id=fre...plish_this
We need some motivation why to add this, where this algorithm is being used, are there any limitations (salt length , pass length), provide some examples with passwords etc
-m 4520 = sha1($salt.sha1($pass))
-m 4521 = Redmine
-m 4522 = PunBB
but with the $salt at the end instead of at the beginning (all of the above use the salt at the start).
Yeah, I don't think it's currently supported and it could make sense to request it on github.
... but don't forget to follow this rules: https://hashcat.net/wiki/doku.php?id=fre...plish_this
We need some motivation why to add this, where this algorithm is being used, are there any limitations (salt length , pass length), provide some examples with passwords etc