md-to-pdf(1)
md-to-pdf(1)
In the field of security, hashes are values across which we come a lot. From
the hashed passwords stored locally in the /etc/shadow to passwords stored
by biggest corporations like Google and Facebook also incorporate one of
the other forms of hashing.
Level 1
1. 48bb6e862e54f2a795ffc4e541caed4d
q1
q1
Now, we can use hashcat along with rockyou.txt to break the hash
using the command:
1. CBFDAC6008F9CAB4083784CBD1874F76618D2A97
1. 1C8BFE8F801D79745C4631D09FFF36C82AA37FC4CCE4FC946683D7B336B6303
1. $2y12Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom
• Now this hash is a bit different from the previous ones as hash-
identifier won’t be able to determine the hashing algorithm used but
we can use Google to find the hash. At the beginning of the hashed
value, we can see the $2y$, this is a hash signature and we can Google
what hashing algorithm has this signature. We can find out that this is
hashed using the bcrypt hashing algorithm. Again that password can
be cracked using mode -m 3200 in hashcat but it might take a lot of
time. So, we can look up for some online bcrypt cracking tools like
the one here. We simply need to provide the hash value, select the
hashing algorithm and perform a search. And we’ll get the desired
cracked value.
1. 279412f945939ba78ce0758d3fd83daa
• With hashcat, we can figure out that this hash appears to be MD5 but
when we try to crack this hash with hashcat using the mode -m 0, the
hash does not get cracked.
We can see that the hash-identifier had also suspected this has to be
an MD4 hash. So, we can try to crack this hash with mode -m 900 in
hashcat but this time also it won’t work. So, we can use another online
hash cracker over here and get the cracked hash value.
Level 2
1. F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0
1. 1DFECA0C002AE40B8619ECF94819CC1B
• This hash got identified as MD5 and MD4 but when tried with hashcat
nono of these worked. On checking the hint for this question it was
mentioned as NTLM. And NTLM hashes can be cracked with hashcat
using mode -m 1000.
1. Hash: 6aReallyHardSalt$6WKUTqzq.UQQmrm0p/
T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/
qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02. Salt: aReallyHardSalt
Rounds: 5
• For this question, we must know that what hashing algorithm uses a 6
signature. After some googling, we can find out that this is a SHA-512
hash signature. Another important thing with this hash is that salting is
used here. And the value between $6$ and the first $ after that is the
salt that is used, which in our case is aReallyHardSalt.