Hashcat

https://www.tunnelsup.com/hash-analyzer/
https://hashes.com/en/tools/hash_identifier
https://md5hashing.net/hash/md5/a18672860d0510e5ab6699730763b250
https://hashcat.net/wiki/doku.php?id=example_hashes
hashcat -m 3200 try /usr/share/wordlists/rockyou.txt
  • 3200 is bcrypt

  • 1000 is NTLM which is when you use hashdump in meterpreter (blue, metasploit)

  • 1400 sha256

  • 1700 is SHA2-512

  • 1800 is sha512crypt /etc/shadow

  • 7300 is IPMI hash (academy - footprinting IPMI)

  • 5600 NTLMv2 from responder (Just get the entire hash from the responder)

  • 22100 is bitlocker

hashcat -m 3200 try rockyou_4characters.txt

refer to the "4 characters rockyou.txt" to get the file txt

tryhackme - crack the hash

hashcat -a 3 -m 1800 forcat.txt ?l?l?d?l?l

https://hashcat.net/wiki/doku.php?id=mask_attack

tryhackme - bruteforce heroes

hashcat --force password.list -r custom.rule --stdout | sort -u > mut_password.list
  • Custom rule is located at ~/academy-htb

Last updated