md5($salt.md5($pass)) No crack
#1
Hey everyone,I made the following test:

password:123456
salt:http://www.google.comR1191SOF
hash types: md5($salt.md5($pass))

The password hash:
0666a532923627fb464fc3c4122de58f

The test6.txt:
0666a532923627fb464fc3c4122de58f:http://www.google.comR1191SOF


./oclHashcat64.bin -m 3710 --attack-mode 3 test6.txt --increment --increment-min 6 --increment-max 6 --custom-charset1 ?d ?1?1?1?1?1?1

Carck result:
Session.Name...: oclHashcat
Status.........: Exhausted
Input.Mode.....: Mask (?1?1?1?1?1?1) [6]
Hash.Target....: 0666a532923627fb464fc3c4122de58f:http://www.google.comR1191SOF
Hash.Type......: md5($salt.md5($pass))
Time.Started...: 0 secs
Time.Estimated.: 0 secs
Speed.GPU.#1...: 56227.2 kH/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 1000000/1000000 (100.00%)
Skipped........: 0/1000000 (0.00%)
Rejected.......: 0/1000000 (0.00%)

No crack,Why?
#2
Salt is too long
#3
I've met so long salt.How to solve it? Thank you!
#4
See here: https://hashcat.net/wiki/doku.php?id=fre...alt_length
#5
"The maximum supported salt-length, in general, for the generic hash-types is 31."
salt:http://www.google.comR1191SOF
The Salt is 28,Why not support? If not support, subsequent versions can add it? Thank you!
#6
In general, but not always. Please read https://hashcat.net/wiki/doku.php?id=fre...plish_this