Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Cracking SHA when I know the salt - is this the right way?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
I've cracked some hashes and the results looks like this:
pass1234
dog1234
banjo1234
etc,
So I know that the salt is 1234 appended at the end of the password.
Now, I fire up cudaHashCat and enter this:
Code:
cudaHashCat64.exe -m 110 7xxa1a94xxbe3cxx660xx237ecxxf505804xxdac:1234

Is this the correct way? It doesn't seem to progress - Recovered (0%), Digests (0%), Speed 0h/s.
You haven't specified an attack mode. If you have a wordlist/dictionary called english.txt (in the same folder as hashcat) use this:

Quote:cudaHashCat64.exe -m 110 -a 0 7xxa1a94xxbe3cxx660xx237ecxxf505804xxdac:1234 english.txt
That's what some people think is a good salting method? Oh dear.