Ask about hash format.
by teddae - Saturday August 19, 2023 at 05:54 PM
#11
Ok. New concept learned.

In the published hashes it is commented that they have SHA1 hash with salt, but they do not say which one it is. So, only having the hash is there a way to find out the salt?
Reply
#12
If you have the salt together with the hashes that means that you can bruteforce by adding the password + the specified salt, but you cannot use any existing i.e rainbow tables to figure out the hash. It's a roadblock to make massive cracking more difficult.

Typically it's pw + "." + salt or just pw + salt, it depends.
Reply
#13
Thanks for last answer.

Let's see if we can make it more concrete. When you get a hash you have a whole hash, by itself you do not know what kind of hash, nor its combination, or if it has salt or pepper.

It is the informative note (txt) published by the author that is associated to the hash that is intuited that it contains some type of salt.


In another order, how to start with dictionaries and combos. That is, files with words, words and the hash decrypted, etc.
Reply
#14
What database are you looking at?

So far, when I run into issues trying to dehash a Breach DB, I can simply find someone smarter on me on the internet who has figured it out first. Find that guy, determine how he decpyhered the hash, then return back to hashcat and break more hashes.

So maybe someone has already solved it.
Reply
#15
(Sep 29, 2023, 03:55 AM)masedan Wrote: Adding a little bit to the conversation, a Salt is very important, but in some cases it's important to have Pepper too.
The difference between salt and pepper is that usually the salt is stored with the hash, and the pepper is stored in a different location. Which add an extra level of security if data are getting leaked, and making it more difficult to find the "salt".

https://en.wikipedia.org/wiki/Pepper_(cryptography)

Thanks for information
Reply
#16
Database was partially decrypted here. However, big part still is intact.  Probably because of the combination with passwords in plain text or other bases without salt.
Reply
#17
Hi again,

Need help to understand how work the hash for this database: questions: (salt added or no, shadow password, etc?)

epik.
Reply
#18
According to HaveIbeenPwnd: https://haveibeenpwned.com/PwnedWebsites#Epik

It's a "variety" of hashes used. I don't recall much useful info in the Epik breach so I didn't bother to index it or dehash it.

What's the hash look like? PasteBin?
Reply
#19
Hi,

Thanks for last answer. At moment, not hash only ask for understand.
Reply
#20
Put here, maybe is better place than before.

Could someone indicate how dropbox saved the hashes of the pass? The idea is to share it later, if you are able to get them out.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Request for South Korea databases. AmazonsGoat 0 136 Yesterday, 08:49 PM
Last Post: AmazonsGoat
  REQUEST (BRAZIL)Asking for the full SERASA leak that includes phone number jesusistheking 3 730 Yesterday, 12:57 PM
Last Post: Jllo12324
Thumbs Up HELLO BREACHFORUMS Satan111 1 159 Yesterday, 08:41 AM
Last Post: hackerxyx
  REQUEST SERASA EXPERIAN (DATABASE) Jllo12324 0 179 Yesterday, 01:02 AM
Last Post: Jllo12324
  ICMR Dateleak Da3monelite 139 50,461 May 01, 2026, 05:59 PM
Last Post: poootham

Forum Jump:


 Users browsing this forum: 1 Guest(s)