Yescrypt hashes
#1
Hi,

I'm trying to get hashcat to crack a yescrypt hash from /etc/shadow file, and I found this https://github.com/hashcat/hashcat/blob/...ckstart.md - but do I understand it wrong if I just need to prepare the hash line or do I need to write the plugin?
Reply
#2
Just follow the steps as explained on that page: format the hash, and adapt the plugin-file for use with yescrypt. Copy-paste, and you're good to go.
Reply
#3
(11-28-2025, 02:22 PM)Banaanhangwagen Wrote: Just follow the steps as explained on that page: format the hash, and adapt the plugin-file for use with yescrypt. Copy-paste, and you're good to go.

I formatted the hash. but what should I put here:  ST_pass="password" in the plugin code?
Also, should the generic_hash_mp.py or generic_hash_sp.py exist somewhere on my ubuntu where hashcat are installed? Because they did not exist.
Reply
#4
You need hashcat 7.1.2 or newer.
Reply
#5
(11-28-2025, 06:00 PM)buka Wrote: You need hashcat 7.1.2 or newer.

Does that have the plugin already embeded so you can just specify a specific format id?
Reply
#6
again, as explained on https://github.com/hashcat/hashcat/blob/...ckstart.md, you'll read that a generic mode 73000 (or 72000) is provided
Reply