Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Cracking md5(md5($pass.$salt).$salt)
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Is there a way to crack these kind of passwords or does it require a feature request?
Also, what is the syntax of input while if these two salts are different. Basically this is about postgresql authentication protocol which uses hashes of format

MD5(MD5(password || user) || per-connection salt)
yeah, due to the per-connection salt speciality it requires a new hash-mode and therefore you need to create a feature request on hashcat's trac
Thank you, created new ticket https://hashcat.net/trac/ticket/490