How to handle masked passwords in input parameters?
#1
For example, the following command

hashcat -m 0 ee89223a2bXXXXXXXX132ed77abbcc79 -a 3 ?h?h?h?h?h?h?h?h?h?h?h?h

I need to perform SHA-256 hashing on each generated candidate password, and then the candidate password should proceed to the original program process


the original process:
?h?h?h?h?h?h?h?h?h?h?h?h
candidate password:  124a4e6fa21a
md5(124a4e6fa21a)
COMPARE(  md5(124a4e6fa21a)  ee89223a2bXXXXXXXX132ed77abbcc79     )


my requirements
?h?h?h?h?h?h?h?h?h?h?h?h
candidate password:  124a4e6fa21a
md5(124a4e6fa21a)
SHA-256(  md5(124a4e6fa21a)  )
COMPARE(  SHA-256(  md5(124a4e6fa21a)  )  ,  ee89223a2bXXXXXXXX132ed77abbcc79     )


I tried to handle this in the function, but actually, the candidate passwords generated by this function do not affect the computation result
Reply
#2
You need a different hashcat mode, not -m 0 but -m 20800.
See https://hashcat.net/wiki/doku.php?id=example_hashes

20800 sha256(md5($pass)) 74ee1fae245edd6f27bf36efc3604942479fceefbadab5dc5c0b538c196eb0f1
Reply