Salt_hex = chr(int(salt, 16)) + chr(int(salt, 16)) + chr(int(salt, 16)) + chr(int(salt, 16)) # CONVERT SALT TO HEXĭef check(password,salt_hex, salt): # HASH PASS AND COMPARE ![]() Here is the relevant code pulled from #Should be 8 characters of salt + sha hash for "password" if I'm understanding this correctlyĭigest = "33BA7C74C318F5D3EF40EB25E1C42F312ACF905E20540226" As such I'll never be able to get my old password. The problem is that when I test on a hash for "password" with the string that's in the example I get a different value than the hash provided. I have my old macbook from a few years back, I don't remember the password exactly but I do recall some of the characters from my password at the time so I was thinking I could probably get the rest using a version of a script that's readily available.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |