I have the hash and the reset token to a bcrypt hash .Just wondering if it can help with unhashing it.
Hashid identify the hash as bigcrypt,it means bcrypt right?
Just wondering if it can work,i haven't tried nothing yet .
I have the hash and the reset token to a bcrypt hash .Just wondering if it can help with unhashing it.
Hashid identify the hash as bigcrypt,it means bcrypt right?
Just wondering if it can work,i haven't tried nothing yet .
Copyright © 2021 Jogjafile Inc.
BigCrypt isn't the same thing as bcrypt. BigCrypt (aka BSDi crypt) is an improved variant of DES crypt developed by BSDi that supports non-truncated longer passwords, a bigger salt, and a variable work factor.
For comparison, a BigCrypt hash looks like this:
_FQ0.amG/zwCMip7DnBk... and a bcrypt hash looks like this:
$2y$12$4HzMep8Ak2aXyx9Ldg32qOWYR5qSCxrQH619Ejk4qgmLZPq5.Sf4KBigCrypt hashes aren't currently supported by hashcat, but John the Ripper does support them as the 'bdsicrypt' format. (I think they may also be automatically detected by the 'descrypt' format as well, but I haven't tested that.).
So you should be able to use John the Ripper to crack these hashes, with something like:
If the hash does turn out to be true bcrypt, just replace 'bsdicrypt' with 'bcrypt' in the command above.
Password reset tokens are usually totally unrelated to the hash itself. They're usually just a way for the application to track the validity and/or status of a user's password reset request.
(Side note: it's best to avoid words like "dehashing", "decrypting", "unhashing", etc. when talking about password hashes, because these terms all imply some kind of reversibility that isn't possible with password hashes, by design. The term of art in this space is 'cracking', where we just guess many different possible plaintexts and see if they produce the target hash.)