Bruteforcing SHA1 with knowing the salt
Hello dear Hashcat community,
I am a studying cybersecurity on my local university. I am stucked at a task given by my lecturer. 
As the task says - I have to find the secret password just by knowing the SHA1 hash and salt. I was reading the documentation and old threads(of much older versions of Hashcat) but I still don't know how to include my salt in command. 

As far as I read on the wiki, I should use the -m parameter with 110 number and -a parameter with value 3. 

Can you please give me a tip how to make use of knowing the salt and any example of command?

I have tryed something like this but with no success:
Hashcat -m 110 -a 3 40DIGITSHA1 (and where should I put salt here?)

Messages In This Thread
Bruteforcing SHA1 with knowing the salt - by tropikando - 04-15-2020, 02:55 PM