The major change for v2.0 was moving everything from the main script and into separate files that would be sourced when called. The first version had some improvements in the time between releasing v2.0. With this script, efficiency and more effective cracking on a mobile GPU was more noticeable. To have a look at the code you can checkout the following commit: git clone With functions like checking requirements to run the script, light rules to have a go with, and also iterate the things I’ve cracked already. Also with this release, I included a bunch of example hashes in three different hashing formats, namely: With a few options already, I felt quite proud being able to do my first (public) release. Common substring (advise: first run steps above) Prefix suffix (advise: first run steps above)ġ0. The first release was one large file with 222 lines of code (without dependencies / add-ins). To get an idea about the performance of this GPU, I ran the benchmark within hashcat – it is available over here.Īfter playing around with hashcat on my CLI and being inefficient about it, I put my gathered knowledge into a simple bash script. This was all optimised to run quick, but effective jobs on a laptop with a dedicated GPU (NVIDIA M1200 Mobile at the time). The idea behind hash-cracker was, and still is, to be able to crack efficiently by putting gathered knowledge on password (re)use into a ‘simple’ script. After using this method for a while, I started looking into more attack modes and options within hashcat. The example above was my first try, this will work for cracking something like Summer2023!, if Summer is in the wordlist. Hashcat -m1000 nt_hashes -a6 wordlist '?d?d?d?d?d?d?s' Hashcat -m1000 nt_hashes -a6 wordlist '?d?d?d?d?d?s' -a6 – attack mode used, in this case hybrid.nt_hashes – a file containing the hashes that I want to crack (e.g.-m1000 – hash mode NTLM – list of supported modes.With this knowledge I wrote some simple commands into a bash script. This brute force pattern can be placed in front or at the end of the words from the list. In this form of hash cracking attacks you have one list with words as input and a brute force pattern. But also, a technique called leet speak – replacing chars o/0 i/1 e/3 etc.īased on this information, I started experimenting with hybrid/combinator attacks. commonly used is a word followed by x amount of numbers and a special character.The Actual Start of Hash-crackerįrom, assessments I’ve learnt a lot about common patterns people tend to use when setting a new password. With current knowledge, I would approach this differently in the future, first better figuring out exactly what the requirements are before building. but is not the main goal.īasically, I have assumed that the commands as shown in the image above should at least be part of the script, not yet thinking further about other techniques and possibilities. Think laptop GPUs and low-level computer GPUs. The opportunity I saw was to improve and eventually create a more efficient way of cracking hashes on regular hardware. Feel free to contribute!ĭuring this note migration, I wondered how could I use the hashcat commands more effectively during engagements. This Hugo based website is built with a CI/CD pipeline via GitHub to CloudFlare P ages where it is hosted as well. The contents of notes_all.txt were all migrated to what is now known as the Knowledge Base – aka kb. /. These notes for hash-cracking are in the image below: The Indirect Start of Hash-crackerįor the start of hash-cracker we first need to go back to the hassle of my notes_all.txt – this was, explicitly, my text file with a list of commands I used most. Below is a short history of how we got to where we are, as well as some examples of how to use it. The idea was to take what I’d learned about common patterns in passwords, and put my experience into practice to make password cracking more efficient on future engagements. I wrote a tool to help with cracking of hashes, today I finally decided to blog about it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |