Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: PrestaShop Password
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi..
I've lost the password of my PrestaShop account and the mailer not work..
I've try to change the settings of mailer by phpMyAdmin but not work..!
I can access by FTP and by phpMyAdmin

This is the possible salt hash:
Code:
define('_COOKIE_KEY_', 'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx');
define('_COOKIE_IV_', 'xxxxxxxxx');
define('_RIJNDAEL_KEY_', 'xxxxxxxxxxxxxxxxxxxxxxxxxxx');
define('_RIJNDAEL_IV_', ''xxxxxxxxxxxxxxxxxxxxxxxxxx);

I suppose that is the _COOKIE_KEY_ but I wait you..
you could just generate a new one and replace the old hash that you have within your database with the newly generated one.
The algorithm is
md5 ($salt . $pass)
salt concatenated with the password (first the salt, no separator)
the salt is just the _COOKIE_KEY_ (see https://stackoverflow.com/a/30095271)

You could just generate a new one like this:
Code:
echo -n bqfkadvejm2cwysvjib4prvh5lofpxsb3lvdndbbwmj87zita3ijxegipassword1234 | md5sum
dee40963841a07de12514a3563137db8

and (after making a backup of your whole database and config) replace you original hash with this one (dee40963841a07de12514a3563137db8) and login with the password "password1234" (without quotes).

BTW: you are not allowed to post hashes here. it's against the forum rules. You will get banned.
(12-06-2017, 10:32 PM)philsmd Wrote: [ -> ]you could just generate a new one and replace the old hash that you have within your database with the newly generated one.
The algorithm is
md5 ($salt . $pass)
salt concatenated with the password (first the salt, no separator)
the salt is just the _COOKIE_KEY_ (see https://stackoverflow.com/a/30095271)

You could just generate a new one like this:
Code:
echo -n bqfkadvejm2cwysvjib4prvh5lofpxsb3lvdndbbwmj87zita3ijxegipassword1234 | md5sum
dee40963841a07de12514a3563137db8

and (after making a backup of your whole database and config) replace you original hash with this one (dee40963841a07de12514a3563137db8) and login with the password "password1234" (without quotes).

BTW: you are not allowed to post hashes here. it's against the forum rules. You will get banned.
But in doing so I should regenerate passwords for all users too. Is not there a way to recover my password with hashcat?