Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: md5($salt1,password,$salt2) ?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
I want to crack like that but i didnt see any option in hashcat

do you help me guys?
Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule.
(11-09-2018, 12:20 PM)undeath Wrote: [ -> ]Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule.

Please can u give an example ? 

i'm new at cracking stuff Sad

This is function of javascript

**
function doLogin() {
document.sendin.username.value = document.login.username.value;
document.sendin.password.value = hexMD5('\103' + document.login.password.value + '\023\057\006\061\107\252\031\022\337\206\115\266\027\310\002\117');
document.sendin.submit();
return false;

**
i got it

i'm trying attack with mask-bruteforce but i cant add "\" to mask it doesnt crack

example hashcat -a ..... \125?d?d?d?d its giving wrong plain i guess?


but for example /125?d?d?d that is working
I solved it

solution : i changed linux OS to windows and its worked
That should be irrelevant. Only how special characters (like "?") are escaped on the OS-native command line (not a hashcat issue) should vary between the platforms.