Crack the hash
Room Link: https://tryhackme.com/room/crackthehash
Hash Cracking Websites
Hash Identifier Website
Hash ID
Great tool that the room provides, use it to identify the hash type when John can't identify the hash by itself.
wget https://gitlab.com/kalilinux/packages/hash-identifier/-/raw/kali/master/hash-id.py
Level 1
48bb6e862e54f2a795ffc4e541caed4d
python hash-id.py 48bb6e862e54f2a795ffc4e541caed4d

john --format=raw-md5 hash.txt
CBFDAC6008F9CAB4083784CBD1874F76618D2A97
python hash-id.py CBFDAC6008F9CAB4083784CBD1874F76618D2A97

john --format=raw-sha1 hash.txt --wordlist=/usr/share/wordlists/rockyou.txt
1C8BFE8F801D79745C4631D09FFF36C82AA37FC4CCE4FC946683D7B336B63032
python hash-id.py 1C8BFE8F801D79745C4631D09FFF36C82AA37FC4CCE4FC946683D7B336B63032
john --format=raw-sha256 hash.txt
$2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom
python hash-id.py $2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom

hash-id couldn't find it so I went to hashcats website and looked at possible hashes. I also filtered for only four letter words from rockyou as mentioned in the hint.
https://hashcat.net/wiki/doku.php?id=example_hashes
grep -Eow '\b\w{4}\b' /usr/share/wordlists/rockyou.txt > new.txt
john --format=bcrypt hash.txt --wordlist=new.txt
279412f945939ba78ce0758d3fd83daa
python hash-id.py 279412f945939ba78ce0758d3fd83daa

john --format=raw-md4 hash.txt --wordlist=password
Level 2
F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0C85
python hash-id.py F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0C85
john --format=raw-sha256 hash.txt
1DFECA0C002AE40B8619ECF94819CC1B
Hash was a NTLM
python hash-id.py 1DFECA0C002AE40B8619ECF94819CC1B

Used https://hashes.com/en/decrypt/hash to solve
$6$aReallyHardSalt$6WKUTqzq.UQQmrm0p/T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02.
Salt: aReallyHardSalt
Used https://www.onlinehashcrack.com/hash-identification.php to identify the hash

hash.txt
The hash is already in the hash so didn't change anything.

john --format=sha512crypt --wordlist=/usr/share/wordlists/rockyou.txt hash.txt
---
e5d8870e5bdd26602cab8dbe07a942c8669e56d6
Salt: tryhackme
python hash-id.py e5d8870e5bdd26602cab8dbe07a942c8669e56d6

hash.txt

hashcat -m 160 hash.txt /usr/share/wordlists/rockyou.txt
hashcat -m 160 hash.txt --show
Last updated