Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: MD5 salted hashs
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
I've got [mostly] down how to use hashcat (and oclhashcat) on unsalted hashes, so I decided to try something harder, a salted hash. I found a cracked md5Confusedalt hash elsewhere and put that, along with the -m 10 example from https://hashcat.net/wiki/doku.php?id=example_hashes into a file, then created a 6 word dictionary with both passwords, including hashcat. However, I fail to find either. The following pruned output:

Code:
hashcat-cli64.exe -a 0 -m 10 md5salt.hash md5salt.dict
Initializing hashcat v0.48 by atom with 6 threads and 32mb segment-size...

Added hashes from file md5salt.hash: 2 (2 salts)

Input.Mode: Dict (md5salt.dict)
Index.....: 1/1 (segment), 6 (words), 45 (bytes)
Recovered.: 0/2 hashes, 0/2 salts
Speed/sec.: - plains, - words
Progress..: 6/6 (100.00%)
Running...: 00:00:00:01
Estimated.: --:--:--:--

It sees the salts, but I don't get any "found" passwords, even though at least one of them *IS* in the dictionary. What am I doing wrong?
Works for me.

Code:
epixoip@token:~/hashcat-0.48$ echo '01dfae6e5d4d90d9892622325959afbe:7050461' >testhash
epixoip@token:~/hashcat-0.48$ echo 'hashcat' >testdict
epixoip@token:~/hashcat-0.48$ ./hashcat-cli64.bin -m 10 testhash testdict
This copy of hashcat will expire on 01.01.2015. Please upgrade to continue using hashcat.

Initializing hashcat v0.48 by atom with 8 threads and 32mb segment-size...

Added hashes from file testhash: 1 (1 salts)
Activating quick-digest mode for single-hash with salt

NOTE: press enter for status-screen

01dfae6e5d4d90d9892622325959afbe:7050461:hashcat

All hashes have been recovered

Input.Mode: Dict (testdict)
Index.....: 1/1 (segment), 1 (words), 8 (bytes)
Recovered.: 1/1 hashes, 1/1 salts
Speed/sec.: - plains, - words
Progress..: 1/1 (100.00%)
Running...: --:--:--:--
Estimated.: --:--:--:--

Started: Sun Dec 21 18:05:40 2014
Stopped: Sun Dec 21 18:05:40 2014

Not sure what you're doing wrong. Maybe you have trailing whitespace or something.
(12-22-2014, 04:06 AM)epixoip Wrote: [ -> ]Not sure what you're doing wrong. Maybe you have trailing whitespace or something.

OK, partially solved. I did have some whitespace at the end of the hashcat hash. But the other still fails. I tried running it through an MD5 hasher, but can't get the known hash. If the hash is MD5Confusedalt, then supposing the salt is M7j and the password is knicky, am I correct that if I MD5(knickyM7j) I should get the hash back, yes?
Correct.

Code:
epixoip@token:~/hashcat-0.48$ echo -n 'knickyM7j' | md5sum
e8f17a431edd2b7edb1ab6b3ceb6f7d5  -
epixoip@token:~/hashcat-0.48$ echo knicky >>testdict
epixoip@token:~/hashcat-0.48$ echo 'e8f17a431edd2b7edb1ab6b3ceb6f7d5:M7j' >>testhash
epixoip@token:~/hashcat-0.48$ ./hashcat-cli64.bin -m 10 testhash testdict
This copy of hashcat will expire on 01.01.2015. Please upgrade to continue using hashcat.

Initializing hashcat v0.48 by atom with 8 threads and 32mb segment-size...

Added hashes from file testhash: 2 (2 salts)

NOTE: press enter for status-screen

01dfae6e5d4d90d9892622325959afbe:7050461:hashcat
e8f17a431edd2b7edb1ab6b3ceb6f7d5:M7j:knicky

All hashes have been recovered

Input.Mode: Dict (testdict)
Index.....: 1/1 (segment), 2 (words), 15 (bytes)
Recovered.: 2/2 hashes, 2/2 salts
Speed/sec.: - plains, - words
Progress..: 2/2 (100.00%)
Running...: --:--:--:--
Estimated.: --:--:--:--

Started: Sun Dec 21 19:30:16 2014
Stopped: Sun Dec 21 19:30:16 2014
That's what I thought. Thanks. If nothing else, I think I finally truly understand salting (as opposed to just being able to define it).