Breaking SHA1-HMAC
#5
Of course that is not good for attacking the hash, if you miss important information (the salt/key in general is known).

You could try to generate a list of salts (e.g. w/ maskprocessor and a suitable mask) and use this output (say "dict") as an external salt file (-e). In this way you search for the correct salt + bruteforce etc the password.

It is clear, that this takes way longer than knowing the salt!


Messages In This Thread
Breaking SHA1-HMAC - by feedworks - 07-31-2013, 05:01 AM
RE: Breaking SHA1-HMAC - by Mangix - 07-31-2013, 09:37 AM
RE: Breaking SHA1-HMAC - by philsmd - 07-31-2013, 06:01 PM
RE: Breaking SHA1-HMAC - by feedworks - 07-31-2013, 06:07 PM
RE: Breaking SHA1-HMAC - by philsmd - 07-31-2013, 06:58 PM
RE: Breaking SHA1-HMAC - by feedworks - 08-01-2013, 12:17 AM
RE: Breaking SHA1-HMAC - by philsmd - 08-01-2013, 02:22 AM
RE: Breaking SHA1-HMAC - by toaster - 08-01-2013, 04:09 PM
RE: Breaking SHA1-HMAC - by Mangix - 08-01-2013, 03:05 AM
RE: Breaking SHA1-HMAC - by toaster - 08-01-2013, 02:22 AM
RE: Breaking SHA1-HMAC - by philsmd - 08-01-2013, 04:23 PM
RE: Breaking SHA1-HMAC - by toaster - 08-01-2013, 04:51 PM
RE: Breaking SHA1-HMAC - by toaster - 08-01-2013, 06:47 PM