Password Cracking - singirikondamani/Noted GitHub Wiki
To check the list and format run β john --list=formats
Cracking NTLM Hashes:
- Step: Get the hash file or hash which needs to be cracked.
- Step: Terminal β Sudo su β
start john -h
- Step: From Terminal β Run β
John --format=nt hashes.txt
Cracking LM Hashes:
- Step: From Terminal β Run β
john --format=lm hash.txt
Wordlist Cracking:
- Step: From Terminal β Run β
john --wordlist=wordlist.txt hash.txt
Brute Force Attack:
- Step: From Terminal β Run β
john --incremental hash.txt
Salts in Hashes:
- Step: From Terminal β Run β
john --format=sha512crypt hash.txt
Cracking WPA/WPA2 Handshake:
- Step3: From Terminal β Run β
aircrack-ng -w wordlist.txt handshake.cap
- Uses Hydra in conjunction with a user list and password list to attempt to crack a password over the specified service-
hydra -L user.list -P password.list <service>://<ip>
- Uses Hashcat to crack NTLM hashes using a specified wordlist -
hashcat -m 1000 dumpedhashes.txt /usr/share/wordlists/rockyou.txt
- Uses Hashcat to attempt to crack a single NTLM hash and display the results in the terminal output -
hashcat -m 1000 64f12cddaa88057e06a81b54e73b949b /usr/share/wordlists/rockyou.txt --show
Crack or audit the password of the server present in network for other users can be done using tool: L0thCrack (Windows Tool)
- Step 1: Go to the system hacking folder Find the L0thCrack folder and install the .exe file
- Step 2: Open the L0THCrack tool, click on the password Auditing Wizard
- Step 3: Select windows
- Step 4: Select the Remote Machine
- Step 5: Select βUse Specific Credentialβ Enter the user name and password provide
- Step 6: Select the Run Job Immediately' allow the output cvs
- Step 7: POP-up shows the Cracked password of all the users.