Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: PBKDF2 HMAC SHA512
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi,

I am currently trying to test my password encryption (PBKDF2 HMAC SHA512) and are having an issue trying to crack a simple password.
I can’t seem to get oclHashCat V1. 37 to work. This is the first time I have used this application and not sure if I‘m using it correctly or have correct 

configuration.

Can someone shed some light my way please.

Password:    MyPassword12345
Encrypted password : U****/DAqx****qHgl***7YVY******AM4******BWs=
Salt:                mvO24idgW2UViAUi7Beufg==
Iterations :  5000

The configuration being used is

cudaHashcat64.exe -m 12100 <HASHES FILE> < DICTIONARY FILE>

The Hashes file contains 
sha512:5000:U****/DAqx****qHgl***7YVY******AM4******BWs=:mvO24idgW2UViAUi7Beufg==


Thanks
What is the problem exactly? You're just putting information without stating what your issue is, or what the expected output is, or what your actual output is. We can't help here if we don't know what you're asking.

And please read through the forum rules. No posting of hashes unless explicitly asked to by the mods or admins.
(12-01-2015, 05:34 PM)wrigglingears Wrote: [ -> ]What is the problem exactly? You're just putting information without stating what your issue is, or what the expected output is, or what your actual output is. We can't help here if we don't know what you're asking.

And please read through the forum rules. No posting of hashes unless explicitly asked to by the mods or admins.

Hi, 

The problem is that i am unable to get the password, even though its in my dictionary.
hashcat has no generic pbkdf2 implementation. You can try getting your hash into grub2 format.
1) There is no such hash mode as -m 12100, check the wiki for the list of hashes that hashcat can deal with.
2) You should specify -a 0 for a dictionary attack. Even though the default is -a 0, it is still good to specify in order to have consistency.
2) Please remove or at least partially obscure the actual hash. Posting the full hash can get you banned from the forums.
@wrigglingears, @undeath: why are you both claiming that there are no generic PBKDF2-HMAC-* hashing algorithms implemented ?
It is both stated here https://hashcat.net/forum/thread-4614.html and here https://hashcat.net/wiki/doku.php?id=example_hashes that PBKDF2-HMAC-MD5, PBKDF2-HMAC-SHA1, PBKDF2-HMAC-SHA256 and PBKDF2-HMAC-SHA512 are supported by oclHashcat.

@thehappygamer108 how did you generate those hashes? are you sure they are generated correctly? It doesn't seem the case (the hash doesn't match to the iteration, salt, password you mentioned).
Please verify that iteration number, salt and password are correct and the hash is correctly generated.
thanks philsmd. I should update every once in a while.
Oh my bad, I was referencing another page in the wiki https://hashcat.net/wiki/doku.php?id=oclhashcat
Guess that needs to be updated then.