Cracking SHA1(linkedin)
#9
It seems like hashcat v6.1.1 is still using the masked hash logic for SHA1 (-m 100 ) which should probably be marked as bug. That is to say that hashcat seems to be ignoring the first 5 nibbles of the SHA1 hash while checking (potential bug?)

SHA1(testing123) = 4c0d2b951ffabd6f9a10489dc40fc356ec1d26d5

But hashcat will find this hash for testing123:

hashcat -m 100 -a3 00000b951ffabd6f9a10489dc40fc356ec1d26d5 testing?d?d?d
00000b951ffabd6f9a10489dc40fc356ec1d26d5:testing123


Please can someone report this as a bug? Unless it is considered a feature?
Reply


Messages In This Thread
Cracking SHA1(linkedin) - by whabikhazri - 08-10-2020, 05:41 PM
RE: Cracking SHA1(linkedin) - by royce - 08-10-2020, 05:45 PM
RE: Cracking SHA1(linkedin) - by whabikhazri - 08-10-2020, 07:05 PM
RE: Cracking SHA1(linkedin) - by philsmd - 08-10-2020, 07:07 PM
RE: Cracking SHA1(linkedin) - by royce - 08-10-2020, 08:45 PM
RE: Cracking SHA1(linkedin) - by whabikhazri - 08-11-2020, 01:43 AM
RE: Cracking SHA1(linkedin) - by philsmd - 08-11-2020, 09:57 AM
RE: Cracking SHA1(linkedin) - by whabikhazri - 08-11-2020, 05:25 PM
RE: Cracking SHA1(linkedin) - by mailmuncher2000 - 02-13-2021, 11:21 AM
RE: Cracking SHA1(linkedin) - by royce - 02-13-2021, 06:22 PM
RE: Cracking SHA1(linkedin) - by mailmuncher2000 - 02-14-2021, 01:06 AM
RE: Cracking SHA1(linkedin) - by mailmuncher2000 - 02-14-2021, 07:46 AM