π§¨Cracking Tools
Hashcat
Hashcat
Installation
# usually installed by default on kali/parrot
apt install hashcat
Usage
# List of hashes
hashcat --example-hashes | grep -i md5 # to see various types of hash examples
Examples
# Decrypt md5 hashes
hashcat -m 0 -a 0 -O hashes.txt /usr/share/wordlists/rockyou.txt
# Decrypt Kerberos5 hashes
hashcat -m 18200 -a 0 -O hashes.txt /usr/share/wordlists/rockyou.txt
# Decrypt Django (PBKDF2-SHA256) hash
hashcat -m 10000 -a 0 -O hash.txt --wordlist /usr/share/wordlists/rockyou.txt
You can locate a handful of hashcat rules available by default on Kali Linux in : /usr/share/hashcat/rules
The following is a list of rules that can be used if the password is not present in a word list chosen. Note : This list is sorted by its complexity, meaning the bottom rule will rule the rest of the rules π
best64.rule
rockyou-30000.rule
dive.rule
OneRuleToRuleThemAll
# Decrypt NTLM hashes with hashcat rule best64.rule
hashcat -m 1000 -a 0 -O hashes.txt /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule
John the Ripper
John the Ripper
Installation
git clone https://github.com/openwall/john.git
cd john/src
./configure && make
# use
cd ../run
./john
Usage
# Cracking MD5 hash
john hash.txt --format=RAW-MD5
# Cracking SHA1 hash
john hash.txt /usr/share/wordlists/rockyou.txt --format=RAW-SHA1
# Cracking Linux passwords
sudo john /etc/shadow
Last updated
Was this helpful?