(03-24-2025, 01:06 PM)Snoopy Wrote:(03-21-2025, 09:08 PM)Ivanich69 Wrote: I have an algorithm for john the ripper that can brute force long hashes, but there is no opencl support. As I understood in this mod also interaction with long hashes. And I can't understand where the values after the hash: 229381927:182719643 come from. The script in john the ripper has this example: $dynamic_2868$hash$serial number$$User
no mode 3730 is not for interacting with long hashes, each oder 99% of hash algorithms have a fixed output
according to hashcat example hashes mode 3730 is defined as
Dahua NVR/DVR/HVR (md5($salt1.strtoupper(md5($salt2.$pass)))) * 0e1484eb061b8e9cfd81868bba1dc4a0:229381927:182719643
so in fact its a double salted md5 and the example has is MD5:Salt1:Salt2 and it seems it was used in *vr devices
salts are generated randomly by the hashalgorithm or generated by some other input
so what kind of hash to you want to attack, or which JtR script do you used?
The man wrote the algorithm himself. But about “and it seems that it was used in *vr devices” - I don't remember that it was used somewhere. I've been working with dahua cameras for a long time, and it's the first time I've seen such a variant. “so what type of hash do you want to attack” - I need to brute force this kind, long hash : serial number : user. (systmp:$dynamic_2868$C53380xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx$$Usystmp) I tried adding the algorithm to hashcat, but nothing works. There are constant compilation errors. I apologize if something is not clear. I'm writing through a translator
C53380xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx - long hash
2C008xxxxxxxxxxxx - serial number
systmp - user