Particle42
  • 🔬Network Enumeration
    • NMAP
    • TCPdump
  • 🔭Website Enumeration
    • Passive Information Gathering
    • Subdomain Enumeration
  • 🖥️Web Application
    • URL & App Scan
    • Subdomain/Vhost Fuzz
    • Login Hack
    • Cross Site Scripting
    • Directory Traversal
    • Local File Inclusion
    • Remote File Inclusion
    • PHP Wrappers
    • SQL Injection
      • Bypass Authentication
      • Database Enumeration
      • Code Execution Via Injection
      • SQL Injection Tools
      • Other Resources
    • NOSQL Injection
      • Bypass Authentication
    • WordPress Scanner
    • Hints & Easter Eggs
  • 🎣Phishing
    • Client Info Gathering
    • HTA
    • Word Macros
    • Windows Library Files
  • 🪟Windows
    • Enumeration & PE Quick Ref
    • Enumeration
      • Users
      • Powershell History
      • System Details
      • Applications & Services
      • Files & Filesystems
      • Cached Creds
    • Windows PE
      • Windows PE Checklist
      • Service Binary Hijacking
      • Important Files
      • Service DLL Hijacking
      • Unquoted Service Paths
      • Other PE Methods
      • Finding PE Vulns
      • SeImpersonatePrivilege
      • Bypassuac using Bypassuac.exe
      • Bypassuac using eventviewer.exe
      • Rasta Watson
    • Windows Remote Access
  • 📂Active Directory
    • About
    • Important Definitions
    • Exploitation Methodology
    • AD Kerberos
      • Invoke-Kerberoast - Shortcut
    • Domain Recon
      • Auto Recon
    • AD Authentication Attacks
      • Password Guessing
      • Creating & Cracking TGS
      • Kerberoasting
    • Lateral Movement
      • Pass the Hash
      • Overpass the Hash
      • Pass the Ticket
      • Distributed Component Object Model
      • Golden Ticket
      • Shadow Copy
      • Domain Controller Sync
      • Windows Management Instrumentation
      • PowerShell Remoting
    • All Commands, Tools & Scripts
      • Using Crackmapexec
      • Using Powerview
      • Important Scripts & Links
  • 🍺Buffer Over Flow
    • Finding EIP Position
    • Eliminating Bad Characters
    • Finding Return Address
    • Payload for BOF
  • 🐧Linux
    • Enumeration
      • Users
      • Encrypted Files
      • System Info
      • Files & Filesystems
      • Applications & Services
    • Attack Vectors
      • Authorised Keys
    • Linux PE
      • Enumeration Commands
      • Finding PE Vulns
      • Check Sudo List
      • Add User to Passwd File
      • SUIDs
      • Tasks with Wildcard
      • Dirty Cow
      • DirtyPipe
      • Insecure File Permissions
      • Enumerating Processes
    • Quick Commands
  • Services
    • SMB
      • Find Server Version
      • Directory Traversal using Symlink
      • Enable Passwordless SMB Access
    • MSSQL
    • MYSQL
    • PHPLiteAdmin
    • SSH
      • Limited Keys Issue
    • SMTP
      • Sending Email
    • Webdav
    • DNS
      • DNS Recon
  • ↗️Pivoting
    • Bringing Internet Access
    • Port Forwarding
      • Local Port Forwarding
      • Remote Port Forwarding
      • Dynamic Port Forwarding
    • HTTP Tunnel-ing
    • DNS Tunneling
    • Chisel
    • Ligolo-NG
  • 🔑Passwords
    • Wordlist Generation
    • HTTP Applications
    • OS Login
    • Password Cracking
      • Using Hashes Directly
      • Cracking Hashes
    • SAM & System
  • 🛠️Practical Tools
    • Remote Shell
      • Alternate Reverse Shells
      • Move to Interactive Shell
    • File Transfers
      • Quick Webservers
    • CURL
    • Payloads
      • MSFVenom
      • Veil Framework
    • Crafty Executable
    • Metasploit
      • Discovery
    • IMPACKET
      • MSSQL-Client
    • Clever Alternatives
  • 🚀Privilege Escalation
    • General Info
  • ⚡Resources
    • Exploits
Powered by GitBook
On this page
  • John the Ripper
  • Linux
  • Hashcat
  • Wordpress Hashes
  • Encrypted ZIP Files

Was this helpful?

  1. Passwords
  2. Password Cracking

Cracking Hashes

Cracking of hashes is a brute force method. We take a list of known passwords, compute the hash and compare it with the hash that is to be cracked. As you can see this is a trial and error methos so it can take many iterations before the password is found. So in order to crack a hash, the more powerful system that you have the faster can the tool compute hashes. These tools predominently depend on the GPU and RAM of the system.

John the Ripper

This tool uses the rules that are defined in the configuration file and the parameters passed to the tool to crack the hash.

The following command can be used to crack a hash from an NT system,

john --rules --wordlist=rockyou.txt hash.txt --format=NT

Linux

There is an extra step while trying to crack the hash from a linux system as the hash has to be unshadowed before it can be cracked. The following command will unshadow the hash,

unshadow passwd-file.txt shadow-file.txt > unshadowed.txt
john --rules --wordlist=rockyou.txt unshadowed.txt

Hashcat

Hashcat is one of the fastest tool for cracking hashes and it offers to crack a wide variety of hashes.

hashcat -m 0 -a 0 -o output.txt hashes.txt 

m - indicates the type of hash, in this case 0 is for md5

a - indicates a dictionary attack using 0

o - To write the hash to an output file

List of some

0500 - Cracking password contained in the passwd file of Linux, MD5(Unix), MD5crypt

5600 - NetNTLM hash of Windows

1000 - NTML hash of windows

13100 - Cracking of hash of SPN created by Mimikatz

Wordpress Hashes

The hashes generated by Wordpress (Portable PHP Password Hashes) for safe guarding the passwords of its users can be cracked using the following online password cracker,

Encrypted ZIP Files

Encrypted zip files can be cracked using John by first extracting the hash of the files and then running John with a wordlist on the hash.

The hash can be extracted using John using the following the command,

zip2john backup.zip > backup.hash

Then John along with the wordlist can be run to crack the password using the following command,

john --format=zip backup.hash --wordlist=/usr/share/wordlists/rockyou.txt

The encrypted files can be opened using 7z with the following command,

7z x <filename>
PreviousUsing Hashes DirectlyNextSAM & System

Last updated 6 months ago

Was this helpful?

🔑
GitHub - micahflee/phpass_crack: A password cracker for Portable PHP password hashesGitHub
Logo