Posts: 3
Threads: 1
Joined: Nov 2025
Hi,
I'm trying to get hashcat to crack a yescrypt hash from /etc/shadow file, and I found this
https://github.com/hashcat/hashcat/blob/...ckstart.md - but do I understand it wrong if I just need to prepare the hash line or do I need to write the plugin?
Posts: 173
Threads: 6
Joined: Mar 2018
Just follow the steps as explained on that page: format the hash, and adapt the plugin-file for use with yescrypt. Copy-paste, and you're good to go.
Posts: 3
Threads: 1
Joined: Nov 2025
(11-28-2025, 02:22 PM)Banaanhangwagen Wrote: Just follow the steps as explained on that page: format the hash, and adapt the plugin-file for use with yescrypt. Copy-paste, and you're good to go.
I formatted the hash. but what should I put here: ST_pass="password" in the plugin code?
Also, should the generic_hash_mp.py or generic_hash_sp.py exist somewhere on my ubuntu where hashcat are installed? Because they did not exist.
Posts: 85
Threads: 0
Joined: Dec 2022
You need hashcat 7.1.2 or newer.
Posts: 3
Threads: 1
Joined: Nov 2025
(11-28-2025, 06:00 PM)buka Wrote: You need hashcat 7.1.2 or newer.
Does that have the plugin already embeded so you can just specify a specific format id?
Posts: 173
Threads: 6
Joined: Mar 2018
again, as explained on
https://github.com/hashcat/hashcat/blob/...ckstart.md, you'll read that a generic mode 73000 (or 72000) is provided