04-18-2017, 07:33 PM
Hi to all!
I tried to crack hash sha256($salt.$pass) but can't find a password
the string is: [email protected]:supportteam:[$pass]:14232934857
hash is 97xxxx7147e3f4342a50f2a46xxxxxx8758036569d229482474b59b1xxxx633f
password is 1234567890
There is no algoritm sha256($salt1.$pass.$salt2), so I run hashcat as mask attack and password is ?d?d?d?d?d?d?d?d?d?d:14232934857
I can't find a password
but if password is 123456789 and hash is 1101xxxx1cf907f82ca71a14caxxxxxxdd5712a9ac15bbbd6b9831c0xxxxxxed than I can find a password!
I has understood that the maximum supported password length is 55 characters, but how to crack hashes like this? The string may have a 50-80 characters long.
Password is 10 or more characters length and generated with small letters, uppercase and digits, so slow dictionary attack on CPU with HM is not working. (HM supported 55 characters password length and 64 characters salt length)
Help please. Have any suggestions? Sorry my English and have a good day! ;)
[edited by philsmd: do not post hashes!]
I tried to crack hash sha256($salt.$pass) but can't find a password
the string is: [email protected]:supportteam:[$pass]:14232934857
hash is 97xxxx7147e3f4342a50f2a46xxxxxx8758036569d229482474b59b1xxxx633f
password is 1234567890
There is no algoritm sha256($salt1.$pass.$salt2), so I run hashcat as mask attack and password is ?d?d?d?d?d?d?d?d?d?d:14232934857
Code:
hashcat64.exe -d 1 -m 1420 -a 3 97xxxx7147e3f4342a50f2a46xxxxxx8758036569d229482474b59b1xxxx633f:[email protected]:supportteam: ?d?d?d?d?d?d?d?d?d?d:14232934857
but if password is 123456789 and hash is 1101xxxx1cf907f82ca71a14caxxxxxxdd5712a9ac15bbbd6b9831c0xxxxxxed than I can find a password!
Code:
hashcat64.exe -d 1 -m 1420 -a 3 1101xxxx1cf907f82ca71a14caxxxxxxdd5712a9ac15bbbd6b9831c0xxxxxxed:[email protected]:supportteam: ?d?d?d?d?d?d?d?d?d:14232934857
I has understood that the maximum supported password length is 55 characters, but how to crack hashes like this? The string may have a 50-80 characters long.
Password is 10 or more characters length and generated with small letters, uppercase and digits, so slow dictionary attack on CPU with HM is not working. (HM supported 55 characters password length and 64 characters salt length)
Help please. Have any suggestions? Sorry my English and have a good day! ;)
[edited by philsmd: do not post hashes!]