Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Help explain the PBKDF2-HMAC-SHA1 hash-example
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hello.

Can someone explain the last separatorline in the PBKDF2-HMAC-SHA1 hash-example ? I am trying to crack a hash generated by PBKDF2.

sha1:1000:MzU4NTA4MzIzNzA1MDQ=:19ofiY+ahBXhvkDsp0j2ww==

Iknow the MzU4NTA4MzIzNzA1MDQ line is the salted hash in base64 but what is the last line? [u]19ofiY+ahBXhvkDsp0j2ww==[/u]

[u]Kind regards Vadlianof[/u]
salt in base64
Thanks for the quick answer!

I used a PBKDF2 generator with the password: abc and salt: test. 
Then it looks like this:

sha1:1000:imirsGNFG+sMgaiy16fwPgWE3rY=:dGVzdA==

When i try to run it i get the error: token length exception, no hashes loaded.

imirsGNFG+sMgaiy16fwPgWE3rY= is the hash i get from the generator and dGVzdA== is the salt: test converted from text to base64. 

Do you know whats wrong here?

Kind regards Vadlianof
the format is:
sha1:[iteration count]:[salt in base64]:[digest in base64]

therefore the hash is:
sha1:1000:dGVzdA==:imirsGNFG+sMgaiy16fwPgWE3rY=

this can be cracked with:
Code:
hashcat -m 12000 -a 0 -w 3 hash.txt dict.txt

where hash.txt contains the hash(es) and dict.txt contains the passwords
Thanks for the help guys! Works like a charm!