Crack the hash
Room Link: https://tryhackme.com/room/crackthehash
Hash Cracking Websites
Hash Identifier Website
Hash ID
Great tool that the room provides, use it to identify the hash type when John can't identify the hash by itself.
wget https://gitlab.com/kalilinux/packages/hash-identifier/-/raw/kali/master/hash-id.pyLevel 1
48bb6e862e54f2a795ffc4e541caed4d
python hash-id.py 48bb6e862e54f2a795ffc4e541caed4d
john --format=raw-md5 hash.txt CBFDAC6008F9CAB4083784CBD1874F76618D2A97
python hash-id.py CBFDAC6008F9CAB4083784CBD1874F76618D2A97 
john --format=raw-sha1 hash.txt --wordlist=/usr/share/wordlists/rockyou.txt1C8BFE8F801D79745C4631D09FFF36C82AA37FC4CCE4FC946683D7B336B63032
python hash-id.py 1C8BFE8F801D79745C4631D09FFF36C82AA37FC4CCE4FC946683D7B336B63032
john --format=raw-sha256 hash.txt$2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom
python hash-id.py $2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom
hash-id couldn't find it so I went to hashcats website and looked at possible hashes. I also filtered for only four letter words from rockyou as mentioned in the hint.
https://hashcat.net/wiki/doku.php?id=example_hashes
grep -Eow '\b\w{4}\b' /usr/share/wordlists/rockyou.txt > new.txt
john --format=bcrypt hash.txt --wordlist=new.txt279412f945939ba78ce0758d3fd83daa
python hash-id.py 279412f945939ba78ce0758d3fd83daa
john --format=raw-md4 hash.txt --wordlist=passwordLevel 2
F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0C85
python hash-id.py F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0C85
john --format=raw-sha256 hash.txt 1DFECA0C002AE40B8619ECF94819CC1B
Hash was a NTLM
python hash-id.py 1DFECA0C002AE40B8619ECF94819CC1B
Used https://hashes.com/en/decrypt/hash to solve
$6$aReallyHardSalt$6WKUTqzq.UQQmrm0p/T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02.
Salt: aReallyHardSalt
Used https://www.onlinehashcrack.com/hash-identification.php to identify the hash

hash.txt
The hash is already in the hash so didn't change anything.

john --format=sha512crypt --wordlist=/usr/share/wordlists/rockyou.txt hash.txt---
e5d8870e5bdd26602cab8dbe07a942c8669e56d6
Salt: tryhackme
python hash-id.py e5d8870e5bdd26602cab8dbe07a942c8669e56d6
hash.txt

hashcat -m 160 hash.txt /usr/share/wordlists/rockyou.txt
hashcat -m 160 hash.txt --showLast updated