Brute Forcing SHA1DASH in Hashcat
by vexxem - May 20, 2021 at 04:01 PM
This is a little used format and I had a very hard time setting this up so this will help anyone also trying to crack this hash type. Maybe there's a more elegant solution to this but this works. For both dictionary and brute force attacks, you need to manually add 2 dashes to the beginning and end of your salt before passing the hashfile to hashcat. So it looks like this:


Then you need to set up your brute force attack with masks that add two dashes on the end of the password. That's the tricky part since you're not allowed to use rule files with brute force attacks. So I got past this problem by creating different runs of different password lengths and appending -- to the end of each run. I did this by defining a custom character set with - as #1 and - as #2. Then I can add those on to the end of the mask string.

So for example, if I'm brute forcing all passwords of 6 characters in length, I would set up a brute force attack with --increment-max 8 because it's 6 plus the 2 dashes. The mask string would be ?d?d?d?d?d?d?1?2 with custom character set #1 and #2 being -

Putting this together the command line would be:

hashcat -m120 -a3 -O -1 - -2 - -i --increment-max 8 -o cracked.txt hashfile.txt ?d?d?d?d?d?d?1?2

You need to manually increase the length of your brute force beyond 6 characters by changing --increment-max to 9 and adding an addition ?d on the front.

Hope this helps!
thanks for the post and the content bro.
thanks bro, very nice work!!!!!!!!!!
This forum account is currently banned. Ban Length: Permanent (N/A).
Ban Reason: Mass Leeching

Possibly Related Threads…
Thread Author Replies Views Last Post
Zynga and SHA1DASH Borter 6 1,374 April 24, 2021 at 11:54 AM
Last Post: Vormixx
SHA1DASH cracking AlexanderCaesar 8 2,424 April 08, 2020 at 09:38 AM
Last Post: sieksx
How To Crack Uplay Accounts Using Minaev Brute Cracking Tool 2018 JuNaiD™ 0 1,741 September 18, 2018 at 07:07 PM
Last Post: JuNaiD™

 Users browsing this thread: 1 Guest(s)