Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Password length
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi to all!
I tried to crack hash sha256($salt.$pass) but can't find a password
the string is: [email protected]:supportteam:[$pass]:14232934857
hash is 97xxxx7147e3f4342a50f2a46xxxxxx8758036569d229482474b59b1xxxx633f
password is 1234567890

There is no algoritm sha256($salt1.$pass.$salt2), so I run hashcat as mask attack and password is ?d?d?d?d?d?d?d?d?d?d:14232934857
Code:
hashcat64.exe -d 1 -m 1420 -a 3 97xxxx7147e3f4342a50f2a46xxxxxx8758036569d229482474b59b1xxxx633f:[email protected]:supportteam: ?d?d?d?d?d?d?d?d?d?d:14232934857
I can't find a password

but if password is 123456789 and hash is 1101xxxx1cf907f82ca71a14caxxxxxxdd5712a9ac15bbbd6b9831c0xxxxxxed than I can find a password!
Code:
hashcat64.exe -d 1 -m 1420 -a 3 1101xxxx1cf907f82ca71a14caxxxxxxdd5712a9ac15bbbd6b9831c0xxxxxxed:[email protected]:supportteam: ?d?d?d?d?d?d?d?d?d:14232934857

I has understood that the maximum supported password length is 55 characters, but how to crack hashes like this? The string may have a 50-80 characters long.
Password is 10 or more characters length and generated with small letters, uppercase and digits, so slow dictionary attack on CPU with HM is not working. (HM supported 55 characters password length and 64 characters salt length)
Help please. Have any suggestions? Sorry my English and have a good day! ;)


[edited by philsmd: do not post hashes!]