Cracking Tricks
John The Ripper
Dictionary attack
Save hash in a file:
Identify the format type:
Using tools like hash-id, hash-identifier, haiti or google we know the format name, but then we need to know the format used for John:
Mask attack
Rule attack
External attack
External mode allows the implementation of C code that John can call.
Incremental attack
Hashcat
Dictionary attack
Save hash in a file:
Identify the format type:
Using tools like hash-id, hash-identifier, haiti or google we know the format name, but then we need to know the format used for Hashcat, in this examples https://hashcat.net/wiki/doku.php?id=example_hashes we can extract it or using:
Dictionary attack - trying all words in a list; also called “straight” mode (attack mode 0,
-a 0
)Combinator attack - concatenating words from multiple wordlists (
-a 1
)Brute-force attack and Mask attack - trying all characters from given charsets, per position (
-a 3
)Hybrid attack - combining wordlists+masks (
-a 6
) and masks+wordlists (-a 7
); can also be done with rulesAssociation attack - use an username, a filename, a hint, or any other pieces of information which could have had an influence in the password generation to attack one specific hash (
-a 9
)
Mask attack
Rule attack
Save a detailed trace of the cracking
Last updated