Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: MD5($salt.$pass) hashcat syntax, help?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
How could i use hashcat to crack this hash?

Syntax:

md5(eWVzX3RoaXNfaXNfdmVyeV9sb25nX3NhbHRfdG9vpassword@123) = 531e89f00f009ced5e0001e33758d3c3

Salt: eWVzX3RoaXNfaXNfdmVyeV9sb25nX3NhbHRfdG9v

Plaintext: password@123

MD5: 531e89f00f009ced5e0001e33758d3c3

I have used following syntax and got Line-length exception error.

Syntax used:

1. hashcat -a 0 -m 0 hash_pass rockyou.txt
2. hashcat -a 0 -m 30 hash_pass rockyou.txt

Error:

Hashfile 'hash_pass' on line 1 (eWVzX3RoaXNfaXNfdmVyeV9sb25nX3NhbHRfdG9vpassword@123): Line-length exception

I know the salt.
I have a wordlist.
I have MD5 of above, i.e. md5($salt.$pass)

I am not sure, how to use hashcat to solve this challenge.

Request help.
the hash must be formatted like this:
Code:
hash:salt
e.g.
531e89....:eWVzX3...

see https://hashcat.net/wiki/example_hashes
Hello @philsmd,

Thanks for your suggestion. I did try out following, however failed:

Syntax: cat hash_pass (output):
531e89f00f009ced5e0001e33758d3c3:eWVzX3RoaXNfaXNfdmVyeV9sb25nX3NhbHRfdG9v

Hashcat command:

hashcat -a 0 -m 10 hash_pass pass

cat pass(output): password@123

This doesn't work, Kindly help.
I would suggest verifying the hash mode. Works for me.
Thanks a lot @undeath & @philsmd.

Worked for me as well Smile