NEW: We have a Discord server now. Click here to go there now!

NOTE: Why not use our List Manager to crack your lists? Its easy and enables better management.

NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - General Discussion - Brute Force 8Tracks


4 Results - Page 1 of 1 -
1
Author Message
Avatar
Snakecharmer

Status: n/a
Joined: Mon, 11 Dec 2017
Posts: 92
Team:
Reputation: 0 Reputation
Online
Tue, 26 Nov 2019 @ 20:12:46

Hey Everyone,

Has anyone tried brute forcing an 8tracks hash? If so do I still need to appended and prepend the salt with “- -“? I’ve tried brute forcing hashes to which dictionary attacks have worked and I know the password but to no luck? Seems odd.


Avatar
Milzo
Administrator
Status: Trusted
Joined: Sat, 29 Dec 2012
Posts: 3099
Team:
Reputation: 4749 Reputation
Online
Tue, 26 Nov 2019 @ 21:43:50

8tracks requires the salt to be prepend and appended with -- aswell as the plain which can be created with with rule $-$-

stack this rule with your usual rules.


Avatar
Snakecharmer

Status: n/a
Joined: Mon, 11 Dec 2017
Posts: 92
Team:
Reputation: 0 Reputation
Online
5 days ago

Adding that rule while using a dictionary attack is fine but when I try to append and prepend in brute force I get a token length error.


Avatar
Milzo
Administrator
Status: Trusted
Joined: Sat, 29 Dec 2012
Posts: 3099
Team:
Reputation: 4749 Reputation
Online
5 days ago

The salt has be be fixed, you cannot alter the salt with rules, only candidate passwords.

The formatting has to be hash:--salt--

Then with BF you can do "?a?a?a?a?a?a?a--" for ex



4 Results - Page 1 of 1 -
1

We have a total of 215728 messages in 26383 topics.
We have a total of 23251 registered users.
Our newest registered member is nixsec.