Given the plaintext, salt, and hash, you can verify if the hash matches the expected value by reproducing the same hash generation process and comparing the result with the provided hash.
Few combinations:
Salt + Plaintext
Plaintext + Salt
Salt + Plaintext + Salt
Plaintext + Salt + Plaintext
And lets try sha3_512 as well
In Python, you can achieve this using the hashlib module:
import hashlib
plaintext = "ecnhjqcndj6122"
salt = "gLwk7qWpxomnujSQyrKP"
expected_hash = "1fd0eb3ad6e4d1229012bc5ab872b841b25b7930557e49ed3ec7f573b28157b8aed2bdd1e5d0c368752ed6034653bf47fc11cb6e5a83d599c8a9455666827e64"
# Compute hash with different combinations of salt and plaintext
computed_hash_1 = hashlib.sha512((salt + plaintext).encode()).hexdigest()
computed_hash_2 = hashlib.sha512((plaintext + salt).encode()).hexdigest()
computed_hash_3 = hashlib.sha512((salt + plaintext + salt).encode()).hexdigest()
computed_hash_4 = hashlib.sha512((plaintext + salt + plaintext).encode()).hexdigest()
computed_3hash_1 = hashlib.new('sha3_512', (salt + plaintext).encode()).hexdigest()
computed_3hash_2 = hashlib.new('sha3_512', (plaintext + salt).encode()).hexdigest()
computed_3hash_3 = hashlib.new('sha3_512', (salt + plaintext + salt).encode()).hexdigest()
computed_3hash_4 = hashlib.new('sha3_512', (plaintext + salt + plaintext).encode()).hexdigest()
# Compare computed hashes with expected hash
if (computed_hash_1 == expected_hash or computed_hash_2 == expected_hash or
computed_hash_3 == expected_hash or computed_hash_4 == expected_hash or computed_3hash_1 == expected_hash or computed_3hash_2 == expected_hash or
computed_3hash_3 == expected_hash or computed_3hash_4 == expected_hash):
print("Hash matches!")
else:
print("Hash does not match!")
Doesn't seem to be a match. Where'd you get the pwd/salt?