Posts: 28
Threads: 6
Joined: Sep 2013
Is it correct functionality of hashcat that a password of 32 characters (MD5) cannot be used for SHA1 in hashcat?
I was trying to use md5's as potential passwords but found this limitation. Passwords of 31 characters are OK.
Is there any way around this?
Posts: 5,185
Threads: 230
Joined: Apr 2010
First, the limit on 31 is not true for all cases, there's ways to support up to 55:
https://hashcat.net/wiki/doku.php?id=fre...ord_length
Anyway, to crack the supposed algorithm, use -m 4700 not -m 100
Posts: 48
Threads: 1
Joined: Oct 2015
Well if I understood your 1st post right you want to crack a SHA-1 hash which in plaintext is a 32 char long hex-string right?
You would have to use the attackmode 1 which is combinator, in this mode your plaintext can go up to 55 chars, as atom already linked.
Posts: 28
Threads: 6
Joined: Sep 2013
06-23-2016, 02:16 PM
(This post was last modified: 06-23-2016, 05:34 PM by zeroprobe.)
EDIT:
Posts: 28
Threads: 6
Joined: Sep 2013
06-23-2016, 05:33 PM
(This post was last modified: 06-23-2016, 06:50 PM by zeroprobe.)
(06-23-2016, 02:16 PM)zeroprobe Wrote: I split my MD5's in the middle.
Combination won't work, too many combinations. I got mixed up.
Is there any way to use a wordlist of md5 hashes as passwords for a SHA1?
Posts: 30
Threads: 1
Joined: May 2015
What if you take your MD5s, chop off the last character, and then use combinator to out it back on? Slow, but faster than anything else.
Posts: 5,185
Threads: 230
Joined: Apr 2010
why don't you just use -m 4700
Posts: 28
Threads: 6
Joined: Sep 2013
(06-25-2016, 10:52 AM)atom Wrote: why don't you just use -m 4700
Doesn't seem to crack with 4700. However taking off 1 character of the md5 password allows it.
Are you able to test? Do you have the same issue.
Posts: 5,185
Threads: 230
Joined: Apr 2010
see here:
Code:
root@ht:~/hashcat# echo -n test | md5sum
098f6bcd4621d373cade4e832627b4f6 -
root@ht:~/hashcat# echo -n 098f6bcd4621d373cade4e832627b4f6 | sha1sum
4028a0e356acc947fcd2bfbf00cef11e128d484a -
root@ht:~/hashcat# ./hashcat -m 4700 4028a0e356acc947fcd2bfbf00cef11e128d484a -a 3 test --quiet
4028a0e356acc947fcd2bfbf00cef11e128d484a:test
root@ht:~/hashcat#
Posts: 28
Threads: 6
Joined: Sep 2013
(06-26-2016, 10:14 AM)atom Wrote: see here:
Code:
root@ht:~/hashcat# echo -n test | md5sum
098f6bcd4621d373cade4e832627b4f6 -
root@ht:~/hashcat# echo -n 098f6bcd4621d373cade4e832627b4f6 | sha1sum
4028a0e356acc947fcd2bfbf00cef11e128d484a -
root@ht:~/hashcat# ./hashcat -m 4700 4028a0e356acc947fcd2bfbf00cef11e128d484a -a 3 test --quiet
4028a0e356acc947fcd2bfbf00cef11e128d484a:test
root@ht:~/hashcat#
I understand now, hashcat will do the real time conversion of the passwords to MD5 to use against the SHA1.
I was using password lists of MD5s.