Score:0

How can I decode the salt of this argon2i passwordhash?

mm flag

I have this password hash: $argon2i$v=19$m=128,t=2411,p=2$hmJvvpH3BZlvb2V1vLm/yf3zANU4qNpKuw5TBnGzo2I$<censored>.

I know the password, and I want to verify if this password will produce the same hash the the above. Using an online argon2 hashing site: https://antelle.net/argon2-browser/

My problem is I don't know how to convert the salt into the right format for hashing.

Maarten Bodewes avatar
in flag
The salt is just the "hmJvvpH3BZlvb2V1vLm/yf3zANU4qNpKuw5TBnGzo2I" part, after base64 decoding the (32 byte / 256 bit) binary data. It is between `$` signs that are not in the base64 alphabet (sorry, I wrote "password hash" instead of "salt" before in this comment).
I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.