Interesting mask.. character, 0, character, 0 etc...
#1
Wink 
Hiyah everyone!

I've only started using this software since yesterday, so I'm a total n00bie.

I've read the --help with the following oclExample0.cmd:
oclHashcat64.exe -t 32 -a 7 example0.hash ?a?a?a?a example.dict

I think it makes a new set of rainbow tables base on a password ?a?a?a?a, which the other two examples then use to find the password?

I'm going to do more reading after work today on what the specifics are.

Looking over the help files so far, I've noticed two things that I want to get the program to do that I can't find information on.

1: This process: SHA1(SHA1(Password))
It doesn't use a salt, and is just SHA1 applied twice, I don't see it in the list of hashes I can use. I *guess* I can create a custom one, but I don't know how yet.

2: Every character in the password before it is hashed has an added ASCII(0) character (a [NULL]).
So ABC = A /0 B /0 C/0 (6 characters)

I've got the code running in .NET to produce the hashes, to check:

ABC = C6876C05F745140F51A200F82159463C91B2522F
123 = EF5EA59F73ED422686786822FA17B3B0DF1B953D

So as I mention above each character of the password is accompanied by a following [NULL] (ASCII 0, not ASCII 48)

SHA1(SHA1(A[NULL]B[NULL]C[NULL])) = C6876C05F745140F51A200F82159463C91B2522F
SHA1(SHA1(1[NULL]2[NULL]3[NULL])) = EF5EA59F73ED422686786822FA17B3B0DF1B953D

Please help me learn!

Many thanks!


Messages In This Thread
Interesting mask.. character, 0, character, 0 etc... - by SarahC - 07-02-2014, 09:52 AM