Cheat Sheet Hacking
  • 🌐Generic Ideas
    • File Transfer
    • Reverse Shell
    • Cracking Tricks
    • Tunneling and Port Forwarding
    • Reversing
    • OSINT
    • Phishing
  • 🐕‍🦺Port enumeration
    • Reconnaissance
    • 53 - DNS
    • 80,443 - Web
      • Identify php.ini file used
      • Exploitation
        • File Upload
        • XXS
    • 445 - SMB
    • 389, 636, 3268 - LDAP(S)
  • LINUX THINGS
    • Enumeration
    • Privilege Escalation
      • Writable $PATH
  • WINDOWS THINGS
    • Enumeration
    • Useful Commands
    • Active Directory Methodology
      • Commands to create AD environment
      • Attacks
        • Kerberos
          • User enumeration
          • ASREP-Roast
          • Kerberoasting
          • ASREP-Roast VS Kerberoasting
          • Golden Ticket
          • Resource Based Constrained Delegation
        • Secrets dump
        • Pass The Hash
        • Dump NTDS
        • Tickets
          • TGT
        • NTML Password Spray
        • LDAP Authentication
          • LDAP Pass-back
          • Rogue LDAP Server
        • SMB Relay (LLNMR, NTB-NS & WPAD)
        • NTLM Relay
        • Tools to exploit AD things
        • SCF Files
      • Kerberos
      • SAM & LSA secrets
      • Enumeration
        • BloodHound
        • PowerView
          • CheatSheet of Commands
        • Set DNS & DOMAIN
      • Resources
      • RunAs
      • Post Explotation
        • Persistence
        • Mimikatz
      • Common used tools
  • 🕳️Pivoting
    • Port Forwarding
    • Socks Forwarding
    • Routing
    • Web Fuzzing
    • Transfer files
    • Metasploit
      • Single Pivot
      • Double Pivot
    • Burp Suite
  • 🎛️Hardware
    • Physical attacks
  • 🌕Buffer Overflow
    • Introduction
    • Stack-Based
      • Introduction
        • Spiking
        • Fuzzing
        • Find Offset
        • Overwrite EIP
        • Find module
        • Find Badchars
        • Shellcode
  • 🐳Docker
    • Commands
    • Practical examples
  • 💡Useful things
    • Burp Suite
      • Proxy Activation
    • Linux Commands
    • Recreate multipart/form-data request
      • Python
      • HTML & netcat
    • TTY
    • Templates for reports (exams)
    • Tmux
    • Other cheat sheets
Powered by GitBook
On this page
  • John The Ripper
  • Dictionary attack
  • Mask attack
  • Rule attack
  • External attack
  • Incremental attack
  • Hashcat
  • Dictionary attack
  • Mask attack
  • Rule attack
  • Save a detailed trace of the cracking
  1. Generic Ideas

Cracking Tricks

John The Ripper

Dictionary attack

Save hash in a file:

echo "e10e3f4d457866b4944fd3fb34f12780" > hash
john --wordlist=/usr/share/wordlists/rockyou.txt hash

Identify the format type:

Using tools like hash-id, hash-identifier, haiti or google we know the format name, but then we need to know the format used for John:

john --list=formats | grep -i md5
john --wordlist=/usr/share/wordlists/rockyou.txt -format=Raw-MD5 hash

Mask attack

Rule attack

External attack

Incremental attack

Hashcat

Dictionary attack

Save hash in a file:

echo "e10e3f4d457866b4944fd3fb34f12780" > hash

Identify the format type:

hashcat -h | grep -i md5
hashcat -a 0 -m 0 hash /usr/share/wordlists/rockyou.txt -o cracked.txt

Mask attack

Rule attack

Save a detailed trace of the cracking

PreviousReverse ShellNextTunneling and Port Forwarding

Last updated 5 months ago

allows the implementation of C code that John can call.

Using tools like hash-id, hash-identifier, haiti or google we know the format name, but then we need to know the format used for Hashcat, in this examples we can extract it or using:

- trying all words in a list; also called “straight” mode (attack mode 0, -a 0)

- concatenating words from multiple wordlists (-a 1)

and - trying all characters from given charsets, per position (-a 3)

- combining wordlists+masks (-a 6) and masks+wordlists (-a 7); can

- use an username, a filename, a hint, or any other pieces of information which could have had an influence in the password generation to attack one specific hash (-a 9)

🌐
External mode
https://hashcat.net/wiki/doku.php?id=example_hashes
Core attack modes
Dictionary attack
Combinator attack
Brute-force attack
Mask attack
Hybrid attack
also be done with rules
Association attack