Original: https://infosecstreams.github.io/csaw21/crack-me/
# Crack Me

Writeup by: [OreoByte](https://github.com/OreoByte)

Team: [OnlyFeet](https://ctftime.org/team/144644)

Writeup URL: [GitHub](https://infosecstreams.github.io/csaw21/crack-me/)


Can you crack this? Your hash: a60458d2180258d47d7f7bef5236b33e86711ac926518ca4545ebf24cdc0b76c. Your salt: the encryption method of the hash. (So if the hash is of the word example, you would submit flag{example} to score points.) UPDATE Friday 9PM: To streamline your efforts we would like to give you some more details about the format for the hash encryption method. An example: if you think the hash is RIPEMD-128, use ripemd128 for the salt.

Here's the [Hash](./hash)

## What Hash is This?

`hashid -m A60458d2180258d47d7f7bef5236b33e86711ac926518ca4545ebf24cdc0b76c`
[Hash Analyzer](https://www.tunnelsup.com/hash-analyzer/)

## Cracking a Salted Hash with Hashcat

# Command Usage: hashcat -m 1420 <hash>:<salt> /usr/share/wordlists/rockyou.txt
$ hashcat -m 1420 A60458d2180258d47d7f7bef5236b33e86711ac926518ca4545ebf24cdc0b76c:sha256 /usr/share/wordlists/rockyou.txt

$ hashcat -m 1420 A60458d2180258d47d7f7bef5236b33e86711ac926518ca4545ebf24cdc0b76c:sha256 /usr/share/wordlists/rockyou.txt --show

## Victory

Submit the flag and claim the points:


Original writeup (https://infosecstreams.github.io/csaw21/crack-me/).