bcrypt type assistance request
#1
After like some days spent on bruteforcing bcrypt hashes with no positive result, using algorithm 3200, I have realised that algorithms

3200, 25600, 25800, 28400, 30600 have similar examples

Quote:$2a$05$/VT2Xs2dMd8GJKfrXhjYP.DkTjOVrY12yDN7/6I8ZV0q/1lEohLru   bcryptmd5

$2a$05$Uo385Fa0g86uUXHwZxB90.qMMdRFExaXePGka4WGFv.86I45AEjmO bcryptsha1

$2a$12$KhivLhCuLhSyMBOxLxCyLu78x4z2X/EJdZNfS3Gy36fvRt56P2jbS bcryptsha512

$2b$10$FxDtpTNaL303lLcWtd6LFO2U6Gc63VJ07qycHcfqbQQ71GhO/qSzu bcryptsha256


$2a$05$LhayLxezLhK1LhWvKxCyLOj0j1u.Kj0jZ0pEmm134uzrQlFvQJLF6 bcrypt (3200) 

All of them are 62 characters long, all of them using same possible character lists, and all of them give no error while choosing wrong attack mode. 
For example I am loading all those 5 hashes, choose bcryptsha256 attack mode, and they are bruteforcing like everything is ok, but wordlist "hashcat" word gives positive result only for correctly chosen attack mode, according to the algorithm. 
So I am doing so many useless work.
Could someone help me, maybe there are some "secrets" and "tricks" which help recognizing correct hashmode for bcrypt hashes? 
hashes dot com says all of them are bcrypt unix 3200 mode, but that is not true


That was example list, maybe someone could show directly on the example here, how we could differ bcrypt hashes
Reply


Messages In This Thread
bcrypt type assistance request - by sorry_me_stupid - 09-27-2023, 03:36 PM
RE: bcrypt type assistance request - by marc1n - 09-27-2023, 03:46 PM
RE: bcrypt type assistance request - by pdo - 09-27-2023, 04:05 PM