Crack the hash

Room Link: https://tryhackme.com/room/crackthehash

Hash Cracking Websites

Hash Identifier Website

Hash ID

Great tool that the room provides, use it to identify the hash type when John can't identify the hash by itself.

wget https://gitlab.com/kalilinux/packages/hash-identifier/-/raw/kali/master/hash-id.py

Level 1

48bb6e862e54f2a795ffc4e541caed4d

python hash-id.py 48bb6e862e54f2a795ffc4e541caed4d
john --format=raw-md5 hash.txt 

CBFDAC6008F9CAB4083784CBD1874F76618D2A97

python hash-id.py CBFDAC6008F9CAB4083784CBD1874F76618D2A97 
john --format=raw-sha1 hash.txt --wordlist=/usr/share/wordlists/rockyou.txt

1C8BFE8F801D79745C4631D09FFF36C82AA37FC4CCE4FC946683D7B336B63032

python hash-id.py 1C8BFE8F801D79745C4631D09FFF36C82AA37FC4CCE4FC946683D7B336B63032

john --format=raw-sha256 hash.txt

$2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom

python hash-id.py $2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom

hash-id couldn't find it so I went to hashcats website and looked at possible hashes. I also filtered for only four letter words from rockyou as mentioned in the hint.

https://hashcat.net/wiki/doku.php?id=example_hashes

grep -Eow '\b\w{4}\b' /usr/share/wordlists/rockyou.txt > new.txt
john --format=bcrypt hash.txt --wordlist=new.txt

279412f945939ba78ce0758d3fd83daa

python hash-id.py 279412f945939ba78ce0758d3fd83daa
john --format=raw-md4 hash.txt --wordlist=password

Level 2

F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0C85

python hash-id.py F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0C85

john --format=raw-sha256 hash.txt 

1DFECA0C002AE40B8619ECF94819CC1B

Hash was a NTLM

python hash-id.py 1DFECA0C002AE40B8619ECF94819CC1B

Used https://hashes.com/en/decrypt/hash to solve

$6$aReallyHardSalt$6WKUTqzq.UQQmrm0p/T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02.

Salt: aReallyHardSalt

Used https://www.onlinehashcrack.com/hash-identification.php to identify the hash

hash.txt

The hash is already in the hash so didn't change anything.

john --format=sha512crypt --wordlist=/usr/share/wordlists/rockyou.txt hash.txt

---

e5d8870e5bdd26602cab8dbe07a942c8669e56d6

Salt: tryhackme

python hash-id.py e5d8870e5bdd26602cab8dbe07a942c8669e56d6

hash.txt

hashcat -m 160 hash.txt /usr/share/wordlists/rockyou.txt
hashcat -m 160 hash.txt --show

Last updated