11-09-2018, 09:39 AM
I want to crack like that but i didnt see any option in hashcat
do you help me guys?
do you help me guys?
md5($salt1,password,$salt2) ?
|
11-09-2018, 09:39 AM
I want to crack like that but i didnt see any option in hashcat
do you help me guys?
11-09-2018, 12:20 PM
Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule.
(11-09-2018, 12:20 PM)undeath Wrote: Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule. Please can u give an example ? i'm new at cracking stuff This is function of javascript ** function doLogin() { document.sendin.username.value = document.login.username.value; document.sendin.password.value = hexMD5('\103' + document.login.password.value + '\023\057\006\061\107\252\031\022\337\206\115\266\027\310\002\117'); document.sendin.submit(); return false; **
11-09-2018, 10:21 PM
i got it
i'm trying attack with mask-bruteforce but i cant add "\" to mask it doesnt crack example hashcat -a ..... \125?d?d?d?d its giving wrong plain i guess? but for example /125?d?d?d that is working
11-10-2018, 02:42 AM
I solved it
solution : i changed linux OS to windows and its worked
11-11-2018, 03:25 PM
That should be irrelevant. Only how special characters (like "?") are escaped on the OS-native command line (not a hashcat issue) should vary between the platforms.
~
|
« Next Oldest | Next Newest »
|