Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: MD5(salt.pass)
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
hi,
i'm new to hashcat, so i have one little question:

How could i crack a MD5 hash with this notation: MD5(salt.pass)?
It doesn't matter, which i use (hashcat, oclhashcat-plus, -lite), but gpu-cracking should be the the favorit one.

what i have: salt, hash and protocol (apop)

thx for all coming answers
tobsen
RTFM  
(08-15-2012, 11:22 PM)RTFM Wrote: [ -> ]RTFM  

thx for that nice answer Smile i'll read it ..
Hi,

If you type ./hascat-clixx.bin ( or .exe / or oclhashcat-plus ) --help

you going to have all the avaible syntax code to be used with hashcat.

In your case & for : md5($salt.$pass) is : 20

So in the case of an Straight attack = ./hashcat-clixx.bin ( or exe or.....) -m 20 -a 0 hashe.txt -o out.txt dic.txt

-m = hashes type

-a = Attack mode

-o = output file

Regards,

Tony
(08-15-2012, 11:29 PM)tony Wrote: [ -> ]Hi,

If you type ./hascat-clixx.bin ( or .exe / or oclhashcat-plus ) --help

you going to have all the avaible syntax code to be used with hashcat.

In your case & for : md5($salt.$pass) is : 20

So in the case of an Straight attack = ./hashcat-clixx.bin ( or exe or.....) -m 20 -a 0 hashe.txt -o out.txt dic.txt

-m = hashes type

-a = Attack mode

-o = output file

Regards,

Tony

much thanks for the fast answer.

so i can only use hashcat-cli32.exe, cause it's the only one which shows md5($salt.$pass) after typing --help. is that right?
(08-15-2012, 11:49 PM)tobsen Wrote: [ -> ]
(08-15-2012, 11:29 PM)tony Wrote: [ -> ]Hi,

If you type ./hascat-clixx.bin ( or .exe / or oclhashcat-plus ) --help

you going to have all the avaible syntax code to be used with hashcat.

In your case & for : md5($salt.$pass) is : 20

So in the case of an Straight attack = ./hashcat-clixx.bin ( or exe or.....) -m 20 -a 0 hashe.txt -o out.txt dic.txt

-m = hashes type

-a = Attack mode

-o = output file

Regards,

Tony

much thanks for the fast answer.

so i can only use hashcat-cli32.exe, cause it's the only one which shows md5($salt.$pass) after typing --help. is that right?

You are welcome...

If i refer' to the https://hashcat.net/oclhashcat-plus/

& https://hashcat.net/hashcat/

The answer is yes only hashcat can manage this type of hashes.
it works Smile thx a lot
for GPU cracking you can try OSC, but it is probably limited to two character salts.