Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Problem with SHA256 and hyphenated salt
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
I think I ran into a bug when trying to crack SHA256 hashes with a hyphenated salt. I hashed the following:

password11111111-1111-1111-1111-111111111111

the salt is 11111111-1111-1111-1111-111111111111

which produces the following hash:

d6b21c5fd4c65673b9660b72fad2ecf6ef0486c659494c601151861a9d2881a3

If I put the hash into oclhashcat as

d6b21c5fd4c65673b9660b72fad2ecf6ef0486c659494c601151861a9d2881a3:11111111-1111-1111-1111-111111111111

with the hash-mode set to 1410 it never cracks it.
not a bug, simply just not supported. max salt length is 32
ok. i come across salts longer than 32 characters quite a bit. is there a possibility it could be extended to something longer?
Not in the generic hash types. But if it's an interessting hash and we add it as a new hash-mode it's possible, all lengths
nothing really interesting. i've seen it in a few php cms' where the salt is a uuid.