Password Cracking - singirikondamani/Noted GitHub Wiki

Cracking the passwords using the tool: john the ripper, hashcat,hashid

Commands for john the ripper

To check the list and format run β†’ john --list=formats Cracking NTLM Hashes:

  1. Step: Get the hash file or hash which needs to be cracked.
  2. Step: Terminal β†’ Sudo su β†’ start john -h
  3. Step: From Terminal β†’ Run β†’ John --format=nt hashes.txt

Cracking LM Hashes:

  1. Step: From Terminal β†’ Run β†’ john --format=lm hash.txt

Wordlist Cracking:

  1. Step: From Terminal β†’ Run β†’ john --wordlist=wordlist.txt hash.txt

Brute Force Attack:

  1. Step: From Terminal β†’ Run β†’ john --incremental hash.txt

Salts in Hashes:

  1. Step: From Terminal β†’ Run β†’ john --format=sha512crypt hash.txt

Cracking WPA/WPA2 Handshake:

  1. Step3: From Terminal β†’ Run β†’ aircrack-ng -w wordlist.txt handshake.cap

Remote Password Attacks:

  1. Uses Hydra in conjunction with a user list and password list to attempt to crack a password over the specified service- hydra -L user.list -P password.list <service>://<ip>

Hashcat password Attacks:

  1. Uses Hashcat to crack NTLM hashes using a specified wordlist - hashcat -m 1000 dumpedhashes.txt /usr/share/wordlists/rockyou.txt
  2. Uses Hashcat to attempt to crack a single NTLM hash and display the results in the terminal output - hashcat -m 1000 64f12cddaa88057e06a81b54e73b949b /usr/share/wordlists/rockyou.txt --show

Crack or audit the password of the server present in network for other users can be done using tool: L0thCrack (Windows Tool)

Method:

  • Step 1: Go to the system hacking folder Find the L0thCrack folder and install the .exe file
  • Step 2: Open the L0THCrack tool, click on the password Auditing Wizard
  • Step 3: Select windows
  • Step 4: Select the Remote Machine
  • Step 5: Select β€œUse Specific Credential” Enter the user name and password provide
  • Step 6: Select the Run Job Immediately' allow the output cvs
  • Step 7: POP-up shows the Cracked password of all the users. image
⚠️ **GitHub.com Fallback** ⚠️