Get plain text password knowing hash and salt
#9
(01-30-2015, 05:45 PM)philsmd Wrote: you could use the --username switch of hashcat/oclHashcat.

input format (you must use the --username switch to crack the hashes):
username:hashConfusedalt

second step (after cracking); you can output it with --show --username
format can be adjusted with --outfile-format, for instance --outfile-format 2 --show --username will give you
username:password


Attention: --username --show currently only works and is supported by oclHashcat. cpu hashcat support for --show --username may or may not be added, depending on how many users care about adding it to trac and voting for this feature

You should be anyway be able to use oclHashcat to do this task

Okay, I own an ATI Radeon R7 260 X so im downloading the AMD oclHashcat. Meanwhile, if you don't mind, could you explain me a bit more?

Now my input file looks like this:

Code:
[ALL hashes removed by philsmd]|

Username | Hash | Salt

So if I use --username in first place it should generate the file ignoring the username in the beginning, but then when you say "second step (after cracking): you can output it with --show --username", what do you mean? I mean, the file is already done, so how would be this "second step". Or just using "--outfile-format 2 --show --username" from the start is enough? Sorry, it isn't clear for me.


Added by philsmd: everyone who posts hashes and hence does not adhere to the (accepted) forum rules ( https://hashcat.net/forum/announcement-2.html ) will be banned, it doesn't matter where the hashes come from (or if they were randomly generated etc)


Messages In This Thread
RE: Get plain text password knowing hash and salt - by N3HL - 01-30-2015, 06:18 PM