This post is by a banned member (UberFuck) - Unhide
08 August, 2022 - 12:02 AM
Reply
(07 August, 2022 - 09:58 PM)PallyBee Wrote: Show More (07 August, 2022 - 06:39 PM)UberFuck Wrote: Show MoreYou need to know what hash type it is first. Without knowing what hash type it is you're never going to crack it.
Its SHA1 salted
Good luck with that. You're 8 chars short of anything SHA1.
This post is by a banned member (UberFuck) - Unhide
08 August, 2022 - 01:53 PM
Reply
Oh, and SHA-1 only consists of 0-9 + A-F. Do some more research before claiming stupid shit.
This post is by a banned member (PallyBee) - Unhide
OP 08 August, 2022 - 03:19 PM
Reply
(08 August, 2022 - 01:53 PM)UberFuck Wrote: Show MoreOh, and SHA-1 only consists of 0-9 + A-F. Do some more research before claiming stupid shit.
fc4a097c97dfff368ee4967731d144b6b8f336ed
This post is by a banned member (UberFuck) - Unhide
08 August, 2022 - 04:34 PM
Reply
(08 August, 2022 - 03:19 PM)PallyBee Wrote: Show More (08 August, 2022 - 01:53 PM)UberFuck Wrote: Show MoreOh, and SHA-1 only consists of 0-9 + A-F. Do some more research before claiming stupid shit.
fc4a097c97dfff368ee4967731d144b6b8f336ed
Your basic wordlist attack - where it will iterate through every line in a dictionary file, calculate the hash and compare against your input. You can reference hashcat.net wiki or helpfile for substituting hash types (parameter m).
Code: # if it's plain sha-1:
hashcat -m 100 -a 0 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt
# if it's salted sha-1(hash:salt):
hashcat -m 110 -a 0 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed:thesalt' /path/to/your/dictionary.txt
# if it's salted sha-1(salt:hash):
hashcat -m 120 -a 0 -o cracked_hashes_out.txt 'thesalt:fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt
So that's the basic wordlist attack, but if you're lucky you might have a 20% success rate / recovery rate. To increase the recovery rate, you need to extend your dictionary using different methods.
An easy way to do that is by utilizing rules. Rules can do things like capitalize letters, substitute chars for "leet" speak, append / prepend chars, etc. One of the more comprehensive ones that ships with hashcat is the dive rule.
Code: hashcat -m <hashtype> -a 0 -o cracked_hashes_out.txt -r /path/to/hashcat/rules/dive.rule 'fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt
If you want, you can also try a bruteforce attack, but it's really only useful for shorter passwords. I normally limit mine to 7-8 chars. Using the --increment switch will loop through the length so it will start with one character, then 2 chars, then 3, etc.
Code: hashcat -m <hashtype> -a 3 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed' '?a?a?a?a?a?a?a?a' --increment
There are additional methods that will get you close to 90% recovery rates, but take more time and processing. Honestly though, if you don't get it cracked using the above, for a novice I'd just submit it to one of the online services to be cracked and pay 5-10 bucks, or whatever the going rate is.
Good luck with everything.
This post is by a banned member (PallyBee) - Unhide
OP 08 August, 2022 - 04:54 PM
Reply
(08 August, 2022 - 04:34 PM)UberFuck Wrote: Show More (08 August, 2022 - 03:19 PM)PallyBee Wrote: Show More (08 August, 2022 - 01:53 PM)UberFuck Wrote: Show MoreOh, and SHA-1 only consists of 0-9 + A-F. Do some more research before claiming stupid shit.
fc4a097c97dfff368ee4967731d144b6b8f336ed
Your basic wordlist attack - where it will iterate through every line in a dictionary file, calculate the hash and compare against your input. You can reference hashcat.net wiki or helpfile for substituting hash types (parameter m).
Code: # if it's plain sha-1:
hashcat -m 100 -a 0 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt
# if it's salted sha-1(hash:salt):
hashcat -m 110 -a 0 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed:thesalt' /path/to/your/dictionary.txt
# if it's salted sha-1(salt:hash):
hashcat -m 120 -a 0 -o cracked_hashes_out.txt 'thesalt:fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt
So that's the basic wordlist attack, but if you're lucky you might have a 20% success rate / recovery rate. To increase the recovery rate, you need to extend your dictionary using different methods.
An easy way to do that is by utilizing rules. Rules can do things like capitalize letters, substitute chars for "leet" speak, append / prepend chars, etc. One of the more comprehensive ones that ships with hashcat is the dive rule.
Code: hashcat -m <hashtype> -a 0 -o cracked_hashes_out.txt -r /path/to/hashcat/rules/dive.rule 'fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt
If you want, you can also try a bruteforce attack, but it's really only useful for shorter passwords. I normally limit mine to 7-8 chars. Using the --increment switch will loop through the length so it will start with one character, then 2 chars, then 3, etc.
Code: hashcat -m <hashtype> -a 3 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed' '?a?a?a?a?a?a?a?a' --increment
There are additional methods that will get you close to 90% recovery rates, but take more time and processing. Honestly though, if you don't get it cracked using the above, for a novice I'd just submit it to one of the online services to be cracked and pay 5-10 bucks, or whatever the going rate is.
Good luck with everything.
Now what if I were to do a full list of hashes (i got 963)
This post is by a banned member (UberFuck) - Unhide
08 August, 2022 - 04:57 PM
Reply
(08 August, 2022 - 04:54 PM)PallyBee Wrote: Show More (08 August, 2022 - 04:34 PM)UberFuck Wrote: Show More (08 August, 2022 - 03:19 PM)PallyBee Wrote: Show Morefc4a097c97dfff368ee4967731d144b6b8f336ed
Your basic wordlist attack - where it will iterate through every line in a dictionary file, calculate the hash and compare against your input. You can reference hashcat.net wiki or helpfile for substituting hash types (parameter m).
Code: # if it's plain sha-1:
hashcat -m 100 -a 0 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt
# if it's salted sha-1(hash:salt):
hashcat -m 110 -a 0 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed:thesalt' /path/to/your/dictionary.txt
# if it's salted sha-1(salt:hash):
hashcat -m 120 -a 0 -o cracked_hashes_out.txt 'thesalt:fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt
So that's the basic wordlist attack, but if you're lucky you might have a 20% success rate / recovery rate. To increase the recovery rate, you need to extend your dictionary using different methods.
An easy way to do that is by utilizing rules. Rules can do things like capitalize letters, substitute chars for "leet" speak, append / prepend chars, etc. One of the more comprehensive ones that ships with hashcat is the dive rule.
Code: hashcat -m <hashtype> -a 0 -o cracked_hashes_out.txt -r /path/to/hashcat/rules/dive.rule 'fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt
If you want, you can also try a bruteforce attack, but it's really only useful for shorter passwords. I normally limit mine to 7-8 chars. Using the --increment switch will loop through the length so it will start with one character, then 2 chars, then 3, etc.
Code: hashcat -m <hashtype> -a 3 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed' '?a?a?a?a?a?a?a?a' --increment
There are additional methods that will get you close to 90% recovery rates, but take more time and processing. Honestly though, if you don't get it cracked using the above, for a novice I'd just submit it to one of the online services to be cracked and pay 5-10 bucks, or whatever the going rate is.
Good luck with everything.
Now what if I were to do a full list of hashes (i got 963)
just replace the 'fc4a097c97dfff368ee4967731d144b6b8f336ed' in the above with the path to a text file containing the hashes (or hash:salt / salt:hash).
This post is by a banned member (PallyBee) - Unhide
OP 08 August, 2022 - 04:58 PM
Reply
(08 August, 2022 - 04:57 PM)UberFuck Wrote: Show More (08 August, 2022 - 04:54 PM)PallyBee Wrote: Show More (08 August, 2022 - 04:34 PM)UberFuck Wrote: Show MoreYour basic wordlist attack - where it will iterate through every line in a dictionary file, calculate the hash and compare against your input. You can reference hashcat.net wiki or helpfile for substituting hash types (parameter m).
Code: # if it's plain sha-1:
hashcat -m 100 -a 0 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt
# if it's salted sha-1(hash:salt):
hashcat -m 110 -a 0 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed:thesalt' /path/to/your/dictionary.txt
# if it's salted sha-1(salt:hash):
hashcat -m 120 -a 0 -o cracked_hashes_out.txt 'thesalt:fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt
So that's the basic wordlist attack, but if you're lucky you might have a 20% success rate / recovery rate. To increase the recovery rate, you need to extend your dictionary using different methods.
An easy way to do that is by utilizing rules. Rules can do things like capitalize letters, substitute chars for "leet" speak, append / prepend chars, etc. One of the more comprehensive ones that ships with hashcat is the dive rule.
Code: hashcat -m <hashtype> -a 0 -o cracked_hashes_out.txt -r /path/to/hashcat/rules/dive.rule 'fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt
If you want, you can also try a bruteforce attack, but it's really only useful for shorter passwords. I normally limit mine to 7-8 chars. Using the --increment switch will loop through the length so it will start with one character, then 2 chars, then 3, etc.
Code: hashcat -m <hashtype> -a 3 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed' '?a?a?a?a?a?a?a?a' --increment
There are additional methods that will get you close to 90% recovery rates, but take more time and processing. Honestly though, if you don't get it cracked using the above, for a novice I'd just submit it to one of the online services to be cracked and pay 5-10 bucks, or whatever the going rate is.
Good luck with everything.
Now what if I were to do a full list of hashes (i got 963)
just replace the 'fc4a097c97dfff368ee4967731d144b6b8f336ed' in the above with the path to a text file containing the hashes (or hash:salt / salt:hash).
Ok thanks
|