Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7675

SHA256 w/ Custom Salt

$
0
0
I have a hash that was created from CakePHP SimplePasswordHasher class using sha256.

This class sets a salt in a cfg file.  In my case the salt looks something like this:

DYhG93b0qyJfIxfs1guVoUubWwvniR2G0FgaC9mi-aoyioueryiqyeryuwry-allup

The hashed password looks something like this:

54800209da18376ee8251f509c112ac13c7cbb9b480e440f9f60cb184999482d

I know the actual password, I am simply trying to understand how to have hashcat crack the password using the configured salt.  the salt looks encoded to some extent too, which is adding confusion.  The salt is setup in a simple config file in the filesystem.

I tried throwing the known password into a file (real.password) and the hashed password into a file (hash.password) and running:

Code:
# hashcat64.bin -m 1410 -a 0 hash.password real.password

I also tried appending the salt to the hashed password with a . separator.  

No luck thus far.

Code:
WARNING: Hashfile 'hash.password' on line 1 (54800209da18376ee8251f509c112ac13c7cbb9b480e440f9f60cb184999482d.DYhG93b0qyJfIxfs1guVoUubWwvniR2G0FgaC9mi-aoyioueryiqyeryuwry-allup): Separator unmatched

...or...

Code:
WARNING: Hashfile 'hash.password' on line 1 (54800209da18376ee8251f509c112ac13c7cbb9b480e440f9f60cb184999482d): Line-length exception

My assumption is that I am either setting the has incorrectly and/or the hash is in an invalid format.

Viewing all articles
Browse latest Browse all 7675

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>