Class 4 Lab 2 ‐ RAR and Hash Cracking - Justin-Boyd/Ethical-Hacking-Class GitHub Wiki
Task 1: Extract the Hash Value
Step 1
- Make sure the Kali VM is running on bridged/NAT for internet access
Step 2
- Copy the attached file (called CrackMe.rar) to the Kali machine’s Documents folder. Try to extract the file and verify it is password-protected.
Step 3
- Navigate to the document’s location (this may be different from the screenshot below, depending on where you placed the file) to extract the hash value of the password from the archive using rar2john (this was introduced in EH-04).
rar2john CrackMe.rar > Hash.txt
Step 4
- To show what is in the Hash.txt file, use cat.
cat Hash.txt
Task 2: Crack the Hash
Step 1
- Before cracking the hash value, we need to navigate to /usr/share/wordlists to unzip rockyou.txt. Use the gzip -d rockyou.txt.gz command.
cd /usr/share/wordlists
gzip -d rockyou.txt.gz
Step 2
- Crack the hash value in the file you saved in task 1. Use the John the Ripper command john --wordlist=/usr/share/wordlists/rockyou.txt Hash.txt to Bruteforce the hash.
john --wordlist=/usr/share/wordlists/rockyou.txt Hash.txt
john -- show Hash.txt
Step 3
- Now that you have found the password, open the MD5 Flag.txt file.
Step 4