03-03-2016, 10:16 AM
I have the following hash
$2a$08$T.139a***ULKFZQTDw0rGuxXXXXXe1PXX3XX1Ds4YSDSc****q6KC
which I understand is bcrypt with salt (perhaps I'm wrong about the salt, 100% it's bcrypt)
And I wonder how hashcat manage these hashes. I'm running -m 3200 -a 0 (hash file) (dic file) (outfile)
is that just it and the salt (if any) is handled automatically?
Also, I have the entire database in CVS file, is there an option to use hashcat on the file and just add entery with the cracked password for each username?
$2a$08$T.139a***ULKFZQTDw0rGuxXXXXXe1PXX3XX1Ds4YSDSc****q6KC
which I understand is bcrypt with salt (perhaps I'm wrong about the salt, 100% it's bcrypt)
And I wonder how hashcat manage these hashes. I'm running -m 3200 -a 0 (hash file) (dic file) (outfile)
is that just it and the salt (if any) is handled automatically?
Also, I have the entire database in CVS file, is there an option to use hashcat on the file and just add entery with the cracked password for each username?