Hi guys,
first of all, thanks to atom for helping me last time and bringing this great project ahead!
So I got these hashes , which are sha1($salt.sha1($salt.sha1($pass))).
Now, if I don't get wrong, this hash should be equivalent to WBB3 Woltlab Burning Board 3.
However, mine have a much shorter salt than typical WBB3, here's an example in hash: salt: pass format:
This fact leads of course to a Line-Length Exception error in hashcat.
Yet, the hash is for sure sha1($salt.sha1($salt.sha1($pass))) and can be decrypted in PasswordsPro, though it's dramatically slow.
Can anyone suggest me a workaround for this?
Thank you so much for your help!
first of all, thanks to atom for helping me last time and bringing this great project ahead!
So I got these hashes , which are sha1($salt.sha1($salt.sha1($pass))).
Now, if I don't get wrong, this hash should be equivalent to WBB3 Woltlab Burning Board 3.
However, mine have a much shorter salt than typical WBB3, here's an example in hash: salt: pass format:
Code:
e9af066d2c2fe7ce45035e89750d5702f938e935:25dc3e84a:110112
This fact leads of course to a Line-Length Exception error in hashcat.
Yet, the hash is for sure sha1($salt.sha1($salt.sha1($pass))) and can be decrypted in PasswordsPro, though it's dramatically slow.
Can anyone suggest me a workaround for this?
Thank you so much for your help!