Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Cracking Hash with Known Plaintext
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi All,

I have been looking around for a while and cannot seem to find the answer. If I have a hash, know the plaintext. How can I crack the salt? I am trying to determine if the rest of the application is using common salts or they are unique.

Thanks.
assuming the hash has a salt, you could use mask processor to make a salt list and then use cpu hashcat with -e. however, its unlikely you will find it unless its simple.
depending on the algorithm, you could simply reverse the role of the password and the salt. for example, if the algorithm is md5(s.p), you could use the password as the salt and crack it as md5(p.s).