Posts: 2
Threads: 1
Joined: Oct 2017
Been searching through the forums and online, but i've not found a way to crack this type of hash. It may be something that I just don't understand.
Is this format supported by hashcat and i'm just overlooking it? If not, any suggestions on what would support this hash?
md5(md5($s).$p)
Thanks.
Posts: 412
Threads: 2
Joined: Dec 2015
10-05-2017, 06:44 PM
(This post was last modified: 10-05-2017, 06:58 PM by Chick3nman.)
I don't believe this algorithm is directly supported currently, but you could easily work around that and run them in hashcat as md5($salt.$pass) by replacing the salts with md5($salt) in your hash file. If you would like to see this algorithm supported, you can submit a request via github, just make sure to follow the guidelines here:
https://hashcat.net/wiki/doku.php?id=fre...plish_this
The mode was deprecated with the merge of Hashcat/oclHashcat and is still technically available in hashcat-legacy as mode 3610.
3610 md5(md5($salt).$pass)
Posts: 2
Threads: 1
Joined: Oct 2017
Thank you for the information. I'm going to see if I can get it to work.
Unfortunately I can't get the old hashcat to install on the new The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali).