Help decrypting/dehashing
by viper242 - Sunday April 21, 2024 at 05:36 AM
#1
I have the following known plain text, salt, and hash. It appears to be SHA512 but it doesn't match. I've tried all the suggested algorithms in Hashcat and none of them work.

plaintext: ecnhjqcndj6122
Salt: gLwk7qWpxomnujSQyrKP
Hash: 1fd0eb3ad6e4d1229012bc5ab872b841b25b7930557e49ed3ec7f573b28157b8aed2bdd1e5d0c368752ed6034653bf47fc11cb6e5a83d599c8a9455666827e64
Reply
#2
Given the plaintext, salt, and hash, you can verify if the hash matches the expected value by reproducing the same hash generation process and comparing the result with the provided hash.

Few combinations:
Salt + Plaintext
Plaintext + Salt
Salt + Plaintext + Salt
Plaintext + Salt + Plaintext

And lets try sha3_512 as well
In Python, you can achieve this using the hashlib module:

import hashlib

plaintext = "ecnhjqcndj6122"
salt = "gLwk7qWpxomnujSQyrKP"
expected_hash = "1fd0eb3ad6e4d1229012bc5ab872b841b25b7930557e49ed3ec7f573b28157b8aed2bdd1e5d0c368752ed6034653bf47fc11cb6e5a83d599c8a9455666827e64"

# Compute hash with different combinations of salt and plaintext
computed_hash_1 = hashlib.sha512((salt + plaintext).encode()).hexdigest()
computed_hash_2 = hashlib.sha512((plaintext + salt).encode()).hexdigest()
computed_hash_3 = hashlib.sha512((salt + plaintext + salt).encode()).hexdigest()
computed_hash_4 = hashlib.sha512((plaintext + salt + plaintext).encode()).hexdigest()

computed_3hash_1 = hashlib.new('sha3_512', (salt + plaintext).encode()).hexdigest()
computed_3hash_2 = hashlib.new('sha3_512', (plaintext + salt).encode()).hexdigest()
computed_3hash_3 = hashlib.new('sha3_512', (salt + plaintext + salt).encode()).hexdigest()
computed_3hash_4 = hashlib.new('sha3_512', (plaintext + salt + plaintext).encode()).hexdigest()

# Compare computed hashes with expected hash
if (computed_hash_1 == expected_hash or computed_hash_2 == expected_hash or
    computed_hash_3 == expected_hash or computed_hash_4 == expected_hash or computed_3hash_1 == expected_hash or computed_3hash_2 == expected_hash or
    computed_3hash_3 == expected_hash or computed_3hash_4 == expected_hash):
    print("Hash matches!")
else:
    print("Hash does not match!")

Doesn't seem to be a match. Where'd you get the pwd/salt?
Buffer Overlord
Deploying Precision in Every Line.
PGP Fingerprint: C1F5 5935 4992 A77B 69E1 B626 7556 1F6B 453C B36F
https://pastebin.com/raw/6k1RJQie
Reply
#3
Thanks DevEye! This is from the 500px database.

I got the plaintext from the MD5 hash db55668c3b3ea5877670599dce51abda which does match.

Is it common for there to be characters introduced between the plaintext and hash?

Or iterated sha512(MD5(plaintext + salt)), sha512(sha512(plaintext + salt)), etc?

I was just using the hash generator on hashes.com so the python hashlib module will speed up trials.
Reply
#4
(04-22-2024, 05:45 AM)viper242 Wrote: Thanks DevEye! This is from the 500px database.

I got the plaintext from the MD5 hash db55668c3b3ea5877670599dce51abda which does match.

Is it common for there to be characters introduced between the plaintext and hash?

Or iterated sha512(MD5(plaintext + salt)), sha512(sha512(plaintext + salt)), etc?

I was just using the hash generator on hashes.com so the python hashlib module will speed up trials.

I think the algo is uknown. We need the source code to figure out exactly what they did...
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Decrypting HTTPS traffic (how to do it explained) reflex 1 393 02-24-2025, 08:04 PM
Last Post: Mrhakuro
  everyone really needs to stop using dehashing reversing or decrypting FutureSeeker 1 348 10-28-2024, 03:37 PM
Last Post: DredgenSun
  Anyone knows a dehashing service? Exploit 3 412 03-14-2024, 08:48 AM
Last Post: En3ronthegreat

Forum Jump:


 Users browsing this thread: 1 Guest(s)