07-23-2014, 03:14 PM
Is there a way to crack these kind of passwords or does it require a feature request?
Cracking md5(md5($pass.$salt).$salt)
|
07-23-2014, 03:14 PM
Is there a way to crack these kind of passwords or does it require a feature request?
07-23-2014, 03:20 PM
Also, what is the syntax of input while if these two salts are different. Basically this is about postgresql authentication protocol which uses hashes of format
MD5(MD5(password || user) || per-connection salt)
07-25-2014, 05:34 PM
yeah, due to the per-connection salt speciality it requires a new hash-mode and therefore you need to create a feature request on hashcat's trac
08-03-2014, 04:01 PM
Thank you, created new ticket https://hashcat.net/trac/ticket/490
|
« Next Oldest | Next Newest »
|