Crack the hash

Room Link: https://tryhackme.com/room/crackthehasharrow-up-right

Hash Cracking Websites

Hash Identifier Website

Hash ID

Great tool that the room provides, use it to identify the hash type when John can't identify the hash by itself.

wget https://gitlab.com/kalilinux/packages/hash-identifier/-/raw/kali/master/hash-id.py

Level 1

48bb6e862e54f2a795ffc4e541caed4d

python hash-id.py 48bb6e862e54f2a795ffc4e541caed4d

CBFDAC6008F9CAB4083784CBD1874F76618D2A97

1C8BFE8F801D79745C4631D09FFF36C82AA37FC4CCE4FC946683D7B336B63032

$2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom

hash-id couldn't find it so I went to hashcats website and looked at possible hashes. I also filtered for only four letter words from rockyou as mentioned in the hint.

https://hashcat.net/wiki/doku.php?id=example_hashesarrow-up-right

279412f945939ba78ce0758d3fd83daa

Level 2

F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0C85

1DFECA0C002AE40B8619ECF94819CC1B

Hash was a NTLM

Used https://hashes.com/en/decrypt/hasharrow-up-right to solve

$6$aReallyHardSalt$6WKUTqzq.UQQmrm0p/T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02.

Salt: aReallyHardSalt

Used https://www.onlinehashcrack.com/hash-identification.phparrow-up-right to identify the hash

hash.txt

The hash is already in the hash so didn't change anything.

---

e5d8870e5bdd26602cab8dbe07a942c8669e56d6

Salt: tryhackme

hash.txt

Last updated