Posts: 317
Threads: 122
Joined: Jul 2023
Ok. New concept learned.
In the published hashes it is commented that they have SHA1 hash with salt, but they do not say which one it is. So, only having the hash is there a way to find out the salt?
Posts: 2
Threads: 0
Joined: Sep 2023
If you have the salt together with the hashes that means that you can bruteforce by adding the password + the specified salt, but you cannot use any existing i.e rainbow tables to figure out the hash. It's a roadblock to make massive cracking more difficult.
Typically it's pw + "." + salt or just pw + salt, it depends.
Posts: 317
Threads: 122
Joined: Jul 2023
Thanks for last answer.
Let's see if we can make it more concrete. When you get a hash you have a whole hash, by itself you do not know what kind of hash, nor its combination, or if it has salt or pepper.
It is the informative note (txt) published by the author that is associated to the hash that is intuited that it contains some type of salt.
In another order, how to start with dictionaries and combos. That is, files with words, words and the hash decrypted, etc.
Posts: 697
Threads: 31
Joined: Jun 2023
What database are you looking at?
So far, when I run into issues trying to dehash a Breach DB, I can simply find someone smarter on me on the internet who has figured it out first. Find that guy, determine how he decpyhered the hash, then return back to hashcat and break more hashes.
So maybe someone has already solved it.
Posts: 59
Threads: 0
Joined: Sep 2023
(Sep 29, 2023, 03:55 AM)masedan Wrote: Adding a little bit to the conversation, a Salt is very important, but in some cases it's important to have Pepper too.
The difference between salt and pepper is that usually the salt is stored with the hash, and the pepper is stored in a different location. Which add an extra level of security if data are getting leaked, and making it more difficult to find the "salt".
https://en.wikipedia.org/wiki/Pepper_(cryptography)
Thanks for information
Posts: 317
Threads: 122
Joined: Jul 2023
Database was partially decrypted here. However, big part still is intact. Probably because of the combination with passwords in plain text or other bases without salt.
Posts: 317
Threads: 122
Joined: Jul 2023
Hi again,
Need help to understand how work the hash for this database: questions: (salt added or no, shadow password, etc?)
epik.
Posts: 697
Threads: 31
Joined: Jun 2023
According to HaveIbeenPwnd: https://haveibeenpwned.com/PwnedWebsites#Epik
It's a "variety" of hashes used. I don't recall much useful info in the Epik breach so I didn't bother to index it or dehash it.
What's the hash look like? PasteBin?
Posts: 317
Threads: 122
Joined: Jul 2023
Hi,
Thanks for last answer. At moment, not hash only ask for understand.
Posts: 317
Threads: 122
Joined: Jul 2023
Put here, maybe is better place than before.
Could someone indicate how dropbox saved the hashes of the pass? The idea is to share it later, if you are able to get them out.
|