Greetings,
I'm trying to crack a salted sha1 hash with hashcat with no information about the password, but I have the salt.
All I know is that the hash was made with the following calculation: hash = sha1(--salt--password--).
I tried different things:
- hashcat -m 120 -a 0 -w 4 -O hashtocrack.hash wordlist.txt -r rulefile
with the following rule "$-$-"
I used the biggest word list that I had found on weakpass but all I got from hashcat was "Exhausted"...
I also tried to brute force it with different masks but no luck for now:
- hashcat -m 120 -a 3 -w 4 -O hashtocrack.hash maskfile
My main hypothesis, because of the website this hash comes from, was that the password started with an upper case later and ended with 1 to 4 figures (because I know from old passwords of the same user that they like to use meaningful years as a number in their passwords). The characters between the first letter and the figures are lower case letters in my hypothesis. And I used masks meeting the requirements of this hypothesis, like ?u?l?l?l?l?l?d?d?d?d for example.
Would it take too much time to use a weaker hypothesis to try to crack it?
Do you guys have any advice on how I could crack it? Whether it be about the masks I should use or other features of hashcat I am not aware of...
I'm trying to crack a salted sha1 hash with hashcat with no information about the password, but I have the salt.
All I know is that the hash was made with the following calculation: hash = sha1(--salt--password--).
I tried different things:
- hashcat -m 120 -a 0 -w 4 -O hashtocrack.hash wordlist.txt -r rulefile
with the following rule "$-$-"
I used the biggest word list that I had found on weakpass but all I got from hashcat was "Exhausted"...
I also tried to brute force it with different masks but no luck for now:
- hashcat -m 120 -a 3 -w 4 -O hashtocrack.hash maskfile
My main hypothesis, because of the website this hash comes from, was that the password started with an upper case later and ended with 1 to 4 figures (because I know from old passwords of the same user that they like to use meaningful years as a number in their passwords). The characters between the first letter and the figures are lower case letters in my hypothesis. And I used masks meeting the requirements of this hypothesis, like ?u?l?l?l?l?l?d?d?d?d for example.
Would it take too much time to use a weaker hypothesis to try to crack it?
Do you guys have any advice on how I could crack it? Whether it be about the masks I should use or other features of hashcat I am not aware of...