Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: [oclHashCat+ help] can it do MyBB salted?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi sorry for a noobie question, I recently made the jump from passwordspro to Hashcat due to this crazy awesome software! OT: can it do MyBB salted hashes? An example from passwordspro would look like this
Code:
b791ccc678b84007f961e22e6d5e8a96:UOSUXpev
using
Code:
md5(md5($salt).md5($pass))

Thanks!
A quick view of the help switch shows the supported hash types and mode to use. The one your looking for is -m 9

./hashcat-cli64.bin --help

0 = MD5
1 = md5($pass.$salt)
2 = md5($salt.$pass)
3 = md5(md5($pass))
4 = md5(md5(md5($pass)))
5 = vBulletin < v3.8.5
6 = md5(md5($salt).$pass)
7 = md5($salt.md5($pass))
8 = md5($salt.$pass.$salt)
9 = md5(md5($salt).md5($pass)) 1000 = NTLM
10 = md5(md5($pass).md5($salt)) 1100 = Domain Cached Credentials
11 = md5($salt.md5($salt.$pass)) 1200 = MD5(Chap)
12 = md5($salt.md5($pass.$salt)) 1300 = MSSQL
15 = vBulletin > v3.8.5
30 = md5($username.0.$pass)
31 = md5(strtoupper(md5($pass)))
100 = SHA1
101 = sha1($pass.$salt)
102 = sha1($salt.$pass)
103 = sha1(sha1($pass))
104 = sha1(sha1(sha1($pass)))
105 = sha1(strtolower($username).$pass)
200 = MySQL
300 = MySQL4.1/MySQL5
400 = MD5(Wordpress)
400 = MD5(phpBB3)
500 = MD5(Unix)
600 = SHA-1(Base64)
700 = SSHA-1(Base64)
800 = SHA-1(Django)
900 = MD4
1400 = SHA256
1600 = MD5(APR)
1700 = SHA512
1800 = SHA-512(Unix)
would the batch file look like this? UOSUXpev is obviously the salt

Code:
oclHashcat+64.exe -m 1000 b791ccc678b84007f961e22e6d5e8a96:UOSUXpev combined-dic.txt
pause

Thanks
Oclhc+ doesnt support it.
Hashcat does.