PBKDF2 HMAC SHA512
#1
Hi,

I am currently trying to test my password encryption (PBKDF2 HMAC SHA512) and are having an issue trying to crack a simple password.
I can’t seem to get oclHashCat V1. 37 to work. This is the first time I have used this application and not sure if I‘m using it correctly or have correct 

configuration.

Can someone shed some light my way please.

Password:    MyPassword12345
Encrypted password : U****/DAqx****qHgl***7YVY******AM4******BWs=
Salt:                mvO24idgW2UViAUi7Beufg==
Iterations :  5000

The configuration being used is

cudaHashcat64.exe -m 12100 <HASHES FILE> < DICTIONARY FILE>

The Hashes file contains 
sha512:5000:U****/DAqx****qHgl***7YVY******AM4******BWs=:mvO24idgW2UViAUi7Beufg==


Thanks
#2
What is the problem exactly? You're just putting information without stating what your issue is, or what the expected output is, or what your actual output is. We can't help here if we don't know what you're asking.

And please read through the forum rules. No posting of hashes unless explicitly asked to by the mods or admins.
#3
(12-01-2015, 05:34 PM)wrigglingears Wrote: What is the problem exactly? You're just putting information without stating what your issue is, or what the expected output is, or what your actual output is. We can't help here if we don't know what you're asking.

And please read through the forum rules. No posting of hashes unless explicitly asked to by the mods or admins.

Hi, 

The problem is that i am unable to get the password, even though its in my dictionary.
#4
hashcat has no generic pbkdf2 implementation. You can try getting your hash into grub2 format.
#5
1) There is no such hash mode as -m 12100, check the wiki for the list of hashes that hashcat can deal with.
2) You should specify -a 0 for a dictionary attack. Even though the default is -a 0, it is still good to specify in order to have consistency.
2) Please remove or at least partially obscure the actual hash. Posting the full hash can get you banned from the forums.
#6
@wrigglingears, @undeath: why are you both claiming that there are no generic PBKDF2-HMAC-* hashing algorithms implemented ?
It is both stated here https://hashcat.net/forum/thread-4614.html and here https://hashcat.net/wiki/doku.php?id=example_hashes that PBKDF2-HMAC-MD5, PBKDF2-HMAC-SHA1, PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-SHA512 are supported by oclHashcat.

@thehappygamer108 how did you generate those hashes? are you sure they are generated correctly? It doesn't seem the case (the hash doesn't match to the iteration, salt, password you mentioned).
Please verify that iteration number, salt and password are correct and the hash is correctly generated.
#7
thanks philsmd. I should update every once in a while.
#8
Oh my bad, I was referencing another page in the wiki https://hashcat.net/wiki/doku.php?id=oclhashcat
Guess that needs to be updated then.