Help for cracking SHA1 password:salt
#4
SnakeEye Wrote: I actually tried removing first 9 chars and using a online decrypter which did not work :-)
Negative. Salted hashes can not be cracked using online DBs.

SnakeEye Wrote: Can I ask you one more thing? To provide me with an example like,
Dictionries attacks are always the best to start with. Try:
Code:
[your_oclhashcat-plus_platform] -m110 [your_hashfile] -o recoverd_hashes.txt [Your_dict]
Note that the hashfile must contain the hashes in the right format, which is Hash:Salt.

SnakeEye Wrote: I'm not into all the command and options right now (just started reading the users manual: http://hashcat.net/files/hashcat_user_manual.pdf)
Negative. That manual is outdated, read the Wiki instead.

SnakeEye Wrote: But how does the sed command work, and is there better dictionaries to use, or am i complete on the wrong road here? :-)
Sed is a text editor originally from Unix systems but can work on Windows too. Try Google for better understanding. I only recommend using sed if you're going to reformat tens of hashes, if less, do it manually.
For better dictionaries see Wordlist Downloads. rockyou.txt is a very good start.


Messages In This Thread
RE: Help for cracking SHA1 password:salt - by M@LIK - 10-15-2012, 10:31 PM