(03-25-2024, 10:11 AM)DanielG Wrote: You can run it at https://dotnetfiddle.net/V9crKz
Perhaps somewhere in the code the pw is modified or represented in a different way. Without the rest of the code it is hard to know how to crack this sha256 hash.
Thanks DanielG - dotnetfiddle is a great way to play. I've extracted the full structure of the hashing and implemented it here:
https://dotnetfiddle.net/5kZo1a
It looks like it is hashing 'salt;pw' - and this now correctly represents the hash made from the application.
Code:
HashPassword with pw:hashcat salt:3tKJrhwSwvp1TG0w
1;3tKJrhwSwvp1TG0w;s+ILzfJ6MOymVTnmeQAa2iDEoEeRdlu0MmWnzyADlvU=