Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: What would be the most efficient way to solve this?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hello guys,

I have a few SHA1 hashes/salts. Some of the passwords are known and they are truncated sha1 hashes (40 - last 14 chars =) 26 chars long. So I have two options right?
(a) Try to mask attack the salted hash or
(b) use a wordlist to crack the known truncated sha1 hash (the actual pwd) and look for a pattern to guess the others, but for that I have to config oclHashcat to check for partial matches, right? Is that even possible?

And how can I take advantage of the fact, that the password is itself a hash? Is there any rule I can use for hashes besides a hex custom charset?

Thanks,

Hyloron
For full speed this requires a special designed hash-mode. If you don't mind about performance simply pipe it.

Quote:perl -MDigest::SHA -ne 'printf "%s\n", substr (Digest::SHA:Confusedha1_hex ($_), 0, 26)' < wordlist.txt | ./oclHashcat64.bin ...
Thanks, I solved it with a combinator attack and searched for the substring programmatically. Maybe not the best way to do it but it worked.