03-24-2025, 01:06 PM
(03-21-2025, 09:08 PM)Ivanich69 Wrote: I have an algorithm for john the ripper that can brute force long hashes, but there is no opencl support. As I understood in this mod also interaction with long hashes. And I can't understand where the values after the hash: 229381927:182719643 come from. The script in john the ripper has this example: $dynamic_2868$hash$serial number$$User
no mode 3730 is not for interacting with long hashes, each oder 99% of hash algorithms have a fixed output
according to hashcat example hashes mode 3730 is defined as
Dahua NVR/DVR/HVR (md5($salt1.strtoupper(md5($salt2.$pass)))) * 0e1484eb061b8e9cfd81868bba1dc4a0:229381927:182719643
so in fact its a double salted md5 and the example has is MD5:Salt1:Salt2 and it seems it was used in *vr devices
salts are generated randomly by the hashalgorithm or generated by some other input
so what kind of hash to you want to attack, or which JtR script do you used?