1. Crack hashes with cracking tools
I created sample hashes for cracking. In this document, with various of tools. Be careful of -n
option in echo command, there will be a line feed or carriage return at the end without the option.
$ echo -n "password" | md5sum | awk '{ print $1 }' | tee /tmp/hash.md5
5f4dcc3b5aa765d61d8327deb882cf99
$ echo -n "vuln" | sha1sum | awk '{ print $1 }' | tee /tmp/hash.sha1
f4968830a8fb353e0e8ff1e28750683f189ed6f6
These tools will be used in this document.
-
HashCat
-
John the Ripper
-
RainbowCrack
1.1. Incremental Password Cracking with HashCat
1.1.1. Installation
You can install the hashcat with your favorite package manager.
# apt install hashcat
# dnf install hashcat
$ nix shell nixpkgs#hashcat
But it is so easy to build from source.
git clone https://github.com/hashcat/hashcat
make
Run hashcat
to see it is successfully built.
$ hashcat
Usage: hashcat [options]... hash|hashfile|hccapxfile [dictionary|mask|directory]...
Try --help for more help.
1.1.2. Usage
Pass --hash-type
or -m
to specify the type of target hash. You can browse supported hash algorithms and its examples in example_hashes [hashcat wiki] page. We are going to crack one MD5 hash, and one SHA1 hash in this page. Pass --hash-type 0
to crack a MD5 hash, or --hash-type 100
to crack a SHA1 hash.
hashcat --hash-type 0 # MD5
hashcat --hash-type 3 # SHA1
Select attack mode by passing --attack-mode
or -a
option. Most of the case, you will try brute force attack first. Pass --attack-mode 3
to try brute force attack.
hashcat --attack-mode 3 # Brute Force (Masking)
You might want to crack it with your GPU. Pass --opencl-device-types 2
or -D 2
option.
Most important thing, you need to specify how you would like to let hashcat to build payloads. It is called masking in hashcat
. You can try brute force attack only with 8 digits or 7 alphabet, or with complex combinations.
?l # lowercase: [a-z]
?u # uppercase: [A-Z]
?d # digits: 0123456789
?h # hexadecimal (lowercase): 0123456789abcdef
?H # HexaDecimal (UpperCase): 0123456789ABCDEF
?s # Special characters: «space»!"#$%&'()*+,-./:;<=>?@[\]^_`{|}~
?b # Binary: 0x00 - 0xff
?a # Combined: ?l?u?d?s
If you want to crack admin\d{3}
, admin123
for example, you could make a mask admin?d?d?d
.
You can even pass --increment
option to set a range of length of password.
See mask_attack [hashcat wiki] to understand how to build masks, and hashcat [hashcat wiki] to see available options.
1.1.3. Attack!
From above section, I build a command to crack the example hash:
hashcat --attack-mode 3 --hash-type 100 /tmp/hash.sha1 '?l?l?l?l'
-
--attac-mode 3
: Brute force (mask) mode -
--hash-type 100
: SHA1 -
/tmp/hash.sha1
: A hash file. -
?l?l?l?l
: 4 lowercase English alphabets.
It took only 6 seconds to crack the hash.
METAL API (Metal 367.6)
=======================
* Device #1: AMD Radeon Pro 5300M, skipped
* Device #2: Intel(R) UHD Graphics 630, skipped
OpenCL API (OpenCL 1.2 (Dec 13 2024 23:08:33)) - Platform #1 [Apple]
====================================================================
* Device #3: Intel(R) Core(TM) i7-9750H CPU @ 2.60GHz, 8160/16384 MB (2048 MB allocatab
* Device #4: Intel(R) UHD Graphics 630, skipped
* Device #5: AMD Radeon Pro 5300M Compute Engine, skipped
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 256
Hashes: 1 digests; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Zero-Byte
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Hash
* Single-Salt
* Brute-Force
* Raw-Hash
ATTENTION! Pure (unoptimized) backend kernels selected.
Pure kernels can crack longer passwords, but drastically reduce performance.
If you want to switch to optimized kernels, append -O to your commandline.
See the above message to find out about the exact limits.
Watchdog: Temperature abort trigger set to 100c
Host memory required for this attack: 3 MB
Approaching final keyspace - workload adjusted.
f4968830a8fb353e0e8ff1e28750683f189ed6f6:vuln
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 100 (SHA1)
Hash.Target......: f4968830a8fb353e0e8ff1e28750683f189ed6f6
Time.Started.....: Mon Mar 3 17:03:46 2025 (0 secs)
Time.Estimated...: Mon Mar 3 17:03:46 2025 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Mask.......: ?l?l?l?l [4]
Guess.Queue......: 1/1 (100.00%)
Speed.#3.........: 83253.1 kH/s (2.36ms) @ Accel:1024 Loops:26 Thr:1 Vec:4
Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
Progress.........: 456976/456976 (100.00%)
Rejected.........: 0/456976 (0.00%)
Restore.Point....: 12288/17576 (69.91%)
Restore.Sub.#3...: Salt:0 Amplifier:0-26 Iteration:0-26
Candidate.Engine.: Device Generator
Candidates.#3....: sdoy -> xqxv
Hardware.Mon.SMC.: Fan0: 84%, Fan1: 83%
Hardware.Mon.#3..: Temp: 57c
Started: Mon Mar 3 17:03:41 2025
Stopped: Mon Mar 3 17:03:47 2025
If a hash is cracked, the status will be 'Cracked'. If every test cases are done but there were no match case, it will be 'Exhausted'. Maybe masks or dictionaries are not enough to crack it.
Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 0 (MD5)
Hash.Target......: 5f4dcc3b5aa765d61d8327deb882cf99
Time.Started.....: Mon Mar 3 17:38:36 2025 (0 secs)
Time.Estimated...: Mon Mar 3 17:38:36 2025 (0 secs)
Kernel.Feature...: Pure Kernel
Guess.Mask.......: ?d?d?d?d?d?d?d?d [8]
Guess.Queue......: 6/6 (100.00%)
Speed.#3.........: 194.2 MH/s (7.43ms) @ Accel:512 Loops:250 Thr:1 Vec:4
Recovered........: 0/1 (0.00%) Digests (total), 0/1 (0.00%) Digests (new)
Progress.........: 100000000/100000000 (100.00%)
Rejected.........: 0/100000000 (0.00%)
Restore.Point....: 100000/100000 (100.00%)
Restore.Sub.#3...: Salt:0 Amplifier:750-1000 Iteration:0-250
Candidate.Engine.: Device Generator
Candidates.#3....: 13832164 -> 68874949
Hardware.Mon.SMC.: Fan0: 99%, Fan1: 100%
Hardware.Mon.#3..: Temp: 65c
If you do not have any information, so you could not build a mask, you can try cracking without a mask.
hashcat --attack-mode 3 --hash-type 100 /tmp/hash.sha1
If you know constraints about length of password, at least three digits to eight digits at most, you can use --increment
option to do that. You should build the possible mask though.
hashcat --attack-mode 3 --hash-type 100 --increment --increment-min 3 /tmp/hash.sha1 '?d?d?d?d?d?d?d?d'
After cracking, you can find a potfile. Usually located in ~/.local/share/hashcat/hashcat.potfile
.
$ cat ~/.local/share/hashcat/hashcat.potfile
f4968830a8fb353e0e8ff1e28750683f189ed6f6:vuln
See frequently_asked_questions [hashcat wiki] for details about the potfile.
1.2. Dictionary Password Cracking with John the Ripper
John the Ripper, simply john, is a hash and password cracker with a long history. If you have searched about how to crack Windows 7 password etc, you might know about the tool.
1.2.1. How to install John
If you’re using MacOS, or Linuxbrew, you can install John with it.
$ brew install john
If you’re a fan of Nix package manager, you can try john
with it.
$ nix-shell -p john
$ nix run nixpkgs#john # If you're using nix-flake.
1.2.2. How to build John
Building the John is really simple. Let’s start with cloning source code of john
from Github.
$ git clone https://github.com/openwall/john
Cloning into 'john'...
...
$ cd john
You can build John running two commands: configure
and make
.
$ cd src
$ ./configure && make
Ah, you should install libssl
before running ./configure
, or when you see the line
configure: error: libssl not found, install it or use --without-openssl option
1.2.3. Attack!
I passed --wordlist
option with a very famous collection of password, rockyou.txt. And I passed --format
option to make it clear the hash is a raw MD5 hash. At the end, hash.md5
file is the hash file containing the example hash above.
$ john --wordlist=~/Downloads/rockyou.txt --format=RAW-MD5 hash.md5
The cracked password will be shown in less then ten seconds.
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-MD5 [MD5 128/128 SSE4.1 4x5])
Press 'q' or Ctrl-C to abort, 'h' for help, almost any other key for status
password (?)
1g 0:00:00:00 DONE (2025-03-11 21:47) 100.0g/s 32000p/s 32000c/s 32000C/s 123456..101010
Use the "--show --format=Raw-MD5" options to display all of the cracked passwords reliably
Session completed.