11-30-2021, 10:46 PM
I'm trying to use mode 120 (sha1($salt.$pass)) to crack a password with hash and salt available:
Password hash: SHA-1 98584b7a2e26e636636e80c0a61249c5f15dadc6
Password salt: 50617373776f7264436865636b4861736830f64e5df716f143 (hex bytes, prepended to password)
Hence the content of `hashes.txt` is `50617373776f7264436865636b4861736830f64e5df716f143:98584b7a2e26e636636e80c0a61249c5f15dadc6`.
Note that the salt and the hash are both not larger than 64 bytes.
I ran ` .\hashcat.exe -m 120 .\hashes.txt` and get this error:
Any ideas on why this is happening?
Password hash: SHA-1 98584b7a2e26e636636e80c0a61249c5f15dadc6
Password salt: 50617373776f7264436865636b4861736830f64e5df716f143 (hex bytes, prepended to password)
Hence the content of `hashes.txt` is `50617373776f7264436865636b4861736830f64e5df716f143:98584b7a2e26e636636e80c0a61249c5f15dadc6`.
Note that the salt and the hash are both not larger than 64 bytes.
I ran ` .\hashcat.exe -m 120 .\hashes.txt` and get this error:
Code:
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Minimim salt length supported by kernel: 0
Maximum salt length supported by kernel: 256
Hashfile '.\hashes.txt' on line 1 (506173...2e26e636636e80c0a61249c5f15dadc6): Token length exception
No hashes loaded.
Any ideas on why this is happening?