Help with -m 3730 mode
#1
Question 
Hello everyone. Please tell me how to work with the -m 3730 mode. I didn't find any instructions. As I understand it, the long hash itself, the serial number and the username are required. As soon as I don't try, nothing comes out, even knowing the password. Help please..
Reply
#2
I didn't get your point, mode 3730 doesn't act other than any other mode

hashcat -a0 -m3730 --status hashfile dictionary

your hash should look like this, taken from https://hashcat.net/wiki/doku.php?id=example_hashes

0e1484eb061b8e9cfd81868bba1dc4a0:229381927:182719643
Reply
#3
(03-21-2025, 08:50 PM)Snoopy Wrote: I didn't get your point, mode 3730 doesn't act other than any other mode

hashcat -a0 -m3730 --status hashfile dictionary

your hash should look like this, taken from https://hashcat.net/wiki/doku.php?id=example_hashes

0e1484eb061b8e9cfd81868bba1dc4a0:229381927:182719643

I have an algorithm for john the ripper that can brute force long hashes, but there is no opencl support. As I understood in this mod also interaction with long hashes. And I can't understand where the values after the hash: 229381927:182719643 come from. The script in john the ripper has this example: $dynamic_2868$hash$serial number$$User
Reply
#4
(03-21-2025, 09:08 PM)Ivanich69 Wrote: I have an algorithm for john the ripper that can brute force long hashes, but there is no opencl support. As I understood in this mod also interaction with long hashes. And I can't understand where the values after the hash: 229381927:182719643 come from. The script in john the ripper has this example: $dynamic_2868$hash$serial number$$User

no mode 3730 is not for interacting with long hashes, each oder 99% of hash algorithms have a fixed output

according to hashcat example hashes mode 3730 is defined as

Dahua NVR/DVR/HVR (md5($salt1.strtoupper(md5($salt2.$pass)))) * 0e1484eb061b8e9cfd81868bba1dc4a0:229381927:182719643

so in fact its a double salted md5 and the example has is MD5:Salt1:Salt2 and it seems it was used in *vr devices

salts are generated randomly by the hashalgorithm or generated by some other input

so what kind of hash to you want to attack, or which JtR script do you used?
Reply