Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   2006

Cracking Hashed Passwords

by PallyBee - 05 August, 2022 - 04:04 PM
This post is by a banned member (UberFuck) - Unhide
UberFuck  
Godlike
1.555
Posts
375
Threads
5 Years of service
#9
(07 August, 2022 - 09:58 PM)PallyBee Wrote: Show More
(07 August, 2022 - 06:39 PM)UberFuck Wrote: Show More
You need to know what hash type it is first.  Without knowing what hash type it is you're never going to crack it.

Its SHA1 salted

Good luck with that.  You're 8 chars short of anything SHA1.
This post is by a banned member (UberFuck) - Unhide
UberFuck  
Godlike
1.555
Posts
375
Threads
5 Years of service
#10
Oh, and SHA-1 only consists of 0-9 + A-F.  Do some more research before claiming stupid shit.
This post is by a banned member (PallyBee) - Unhide
This post is by a banned member (UberFuck) - Unhide
UberFuck  
Godlike
1.555
Posts
375
Threads
5 Years of service
#12
(08 August, 2022 - 03:19 PM)PallyBee Wrote: Show More
(08 August, 2022 - 01:53 PM)UberFuck Wrote: Show More
Oh, and SHA-1 only consists of 0-9 + A-F.  Do some more research before claiming stupid shit.

fc4a097c97dfff368ee4967731d144b6b8f336ed

Your basic wordlist attack -  where it will iterate through every line in a dictionary file, calculate the hash and compare against your input. You can reference hashcat.net wiki or helpfile for substituting hash types (parameter m).  
Code:
# if it's plain sha-1:
hashcat -m 100 -a 0 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt

# if it's salted sha-1(hash:salt):
hashcat -m 110 -a 0 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed:thesalt' /path/to/your/dictionary.txt

# if it's salted sha-1(salt:hash):
hashcat -m 120 -a 0 -o cracked_hashes_out.txt 'thesalt:fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt

So that's the basic wordlist attack, but if you're lucky you might have a 20% success rate / recovery rate.  To increase the recovery rate, you need to extend your dictionary using different methods.
An easy way to do that is by utilizing rules.  Rules can do things like capitalize letters, substitute chars for "leet" speak, append / prepend chars, etc. One of the more comprehensive ones that ships with hashcat is the dive rule.
Code:
hashcat -m <hashtype> -a 0 -o cracked_hashes_out.txt -r /path/to/hashcat/rules/dive.rule 'fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt

If you want, you can also try a bruteforce attack, but it's really only useful for shorter passwords.  I normally limit mine to 7-8 chars.  Using the --increment switch will loop through the length so it will start with one character, then 2 chars, then 3, etc.
Code:
hashcat -m <hashtype> -a 3 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed' '?a?a?a?a?a?a?a?a' --increment

There are additional methods that will get you close to 90% recovery rates, but take more time and processing.  Honestly though, if you don't get it cracked using the above, for a novice I'd just submit it to one of the online services to be cracked and pay 5-10 bucks, or whatever the going rate is.

Good luck with everything.
This post is by a banned member (PallyBee) - Unhide
This post is by a banned member (UberFuck) - Unhide
UberFuck  
Godlike
1.555
Posts
375
Threads
5 Years of service
#14
(08 August, 2022 - 04:54 PM)PallyBee Wrote: Show More
(08 August, 2022 - 04:34 PM)UberFuck Wrote: Show More
(08 August, 2022 - 03:19 PM)PallyBee Wrote: Show More
fc4a097c97dfff368ee4967731d144b6b8f336ed

Your basic wordlist attack -  where it will iterate through every line in a dictionary file, calculate the hash and compare against your input. You can reference hashcat.net wiki or helpfile for substituting hash types (parameter m).  
Code:
# if it's plain sha-1:
hashcat -m 100 -a 0 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt

# if it's salted sha-1(hash:salt):
hashcat -m 110 -a 0 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed:thesalt' /path/to/your/dictionary.txt

# if it's salted sha-1(salt:hash):
hashcat -m 120 -a 0 -o cracked_hashes_out.txt 'thesalt:fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt

So that's the basic wordlist attack, but if you're lucky you might have a 20% success rate / recovery rate.  To increase the recovery rate, you need to extend your dictionary using different methods.
An easy way to do that is by utilizing rules.  Rules can do things like capitalize letters, substitute chars for "leet" speak, append / prepend chars, etc. One of the more comprehensive ones that ships with hashcat is the dive rule.
Code:
hashcat -m <hashtype> -a 0 -o cracked_hashes_out.txt -r /path/to/hashcat/rules/dive.rule 'fc4a097c97dfff368ee4967731d144b6b8f336ed' /path/to/your/dictionary.txt

If you want, you can also try a bruteforce attack, but it's really only useful for shorter passwords.  I normally limit mine to 7-8 chars.  Using the --increment switch will loop through the length so it will start with one character, then 2 chars, then 3, etc.
Code:
hashcat -m <hashtype> -a 3 -o cracked_hashes_out.txt 'fc4a097c97dfff368ee4967731d144b6b8f336ed' '?a?a?a?a?a?a?a?a' --increment

There are additional methods that will get you close to 90% recovery rates, but take more time and processing.  Honestly though, if you don't get it cracked using the above, for a novice I'd just submit it to one of the online services to be cracked and pay 5-10 bucks, or whatever the going rate is.

Good luck with everything.

Now what if I were to do a full list of hashes (i got 963)

just replace the 'fc4a097c97dfff368ee4967731d144b6b8f336ed' in the above with the path to a text file containing the hashes (or hash:salt / salt:hash).
This post is by a banned member (PallyBee) - Unhide

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)