The replies in this thread is horrible, I am almost disappointed.
First of all, OP (union_select_h4ck), never ever use such subjects again. We are not interested in whether or not you found stuff in the tutorial section and searched around, its a good thing that you did but that title does not help us or anyone in any way. I have renamed it for you. Additionally you should have posted your hash in the first post.
Having a look at
http://www.insidepro.com/hashes.php and previous experience I would say your hash was generated by the password() function in a mysql version post-4.1. (check out
http://dev.mysql.com/doc/refman/5.0/en/password-hashing.html).
The (default) password() function in a post 4.1 version of mysql would be a double sha1 indeed, but can be changed, however your hash is probably not.
http://www.insidepro.com/eng/passwordspro.shtml will be able to crack your hash, or at least try. It also supports rainbow tables afaik (read down).
As a bonus, here is a PHP implementation of the password() function:
<?php
$pass = "12345678";
echo "*".strtoupper(sha1(hex2bin(sha1($pass))));
?>
Many Hashes are pre calculated an written down in rainbow tables.
Have you tried using a rainbow table ?
And I don't even know that's gonna work because it could be that the hash is salted
(I am not sure if MySql5 salts passwords but it would be safer. Please correct me if I am mistaking)
You are mistaken, it does not salt the passwords. In fact, the password() function in mysql should not be used to hash user passwords according to mysql's documentation.
As far as I researched this is a 160 bit SHA-1 Hash.
So your only chance IS a rainbow table ( and still I doubt that this is gonna work)
Your only chance is NEVER just rainbow tables. Bruteforce and wordlists are always an option. Alltho in this case I would go for tables from
https://www.freerainbowtables.com/en/tables2/ (they are HUGE tho).