First install name that hash tool for identifying the correct hash.
pip3 install name-that-hash
If pip3 is not installed on the system then install it first by issuing,
apt get install python3-pip
Now copy the hash and paste it on a text file. name that hash.txt
Command for checking the hash:
nth --file hash.txt
you can also use hashid tool.
hashid "\$1\$scanner\$woffjK7eiNedlKbh6Dcw71"
Using hashid condition is, you just need to escape the $ sign by putting back slash before it.
Now say you got the name of hash which is md5crypt. Now this is time to crack.
hashcat --force -m 500 -a 0 -o cracked.txt --remove hash.txt /usr/share/wordlists/rockyou.txt
Command break down:
-m is hash type which is 500. Name that hash tool will tell you what is the type of the hash. Numeric code value to identify each hash type.
-a 0 attack mode. 0 is for straight.
-o output file
cracked.txt --> where cracked password will be saved.
--remove --> enable remove of hash once it is cracked. meaning once the hash is cracked then you will not find your hash in hash.txt file that you saved earlier. Once it is cracked, the hash along with the cracked password will be moved to cracked.txt file.
hash.txt --> the file that contains the hash.
Example of m45 crypt hash is --> $1$scanner$woffjK7eiNedlKbh6Dcw71
Hashcat cheatsheet:
https://github.com/frizb/Hashcat-Cheatsheet
Comments
Post a Comment