Navigation :
Open Source Intelligence (OSINT)
Web Pentest
Network
Shells methods
Windows Systems
Linux Systems
Other Systems
Passcracking Hash & Files
- Hashcat Cheatsheet
- John Cheatsheet
- Cracking files
- Wordlists & Co
- MISC & Others
Phishing, RedTeam and SE
Wireless
Cryptography
Pwn
Defensive, Monitoring, CTI...
External Resources
Cracking files
Cracking archives
# RAR
rar2john file.rar > rar_hashes.txt
john --wordlist= passwords.txt rar_hashes.txt
# ZIP
zip2john file.rar > zip_hashes.txt
john --wordlist= passwords.txt zip_hashes.txt
# ZIP Using fcrackzip
fcrackzip -u -D -p rockyou.txt recup.zip
Cracking shadow files
unshadow passwd shadow > shadowjohn.txt
john --wordlist= /home/user/Desktop/Certifs/OSCP/Tools/Wordlist/Bruteforce/rockyou.txt --rules shadowjohn.txt
john --show shadowjohn.txt
# Hashcat SHA512 $6$ shadow file
hashcat -m 1800 -a 0 hash.txt rockyou.txt --username
#Hashcat MD5 $1$ shadow file
hashcat -m 500 -a 0 hash.txt rockyou.txt --username
Various cracking techniques
# Hashcat MD5 Apache webdav file
hashcat -m 1600 -a 0 hash.txt rockyou.txt
# Hashcat SHA1
hashcat -m 100 -a 0 hash.txt rockyou.txt --force
# Hashcat Wordpress
hashcat -m 400 -a 0 --remove hash.txt rockyou.txt
# SSH Key
ssh2john id_rsa > sshtocrack
john --wordlist= /usr/share/wordlists/rockyou.txt sshtocrack
# Cracking Cisco passwords
# Type 5 → MD5
# Type 7 → Easy reversible
hashcat -m 500 c:\t emp\c iscohash.txt C:\D ICS\e nglish-dic.txt
# Cracking NTLVMv2 hashes
john --format= netntlmv2 --wordlist= "/usr/share/wordlists/rockyou.txt" hash.txt
Cracking TGS
# Using John from bleeding repo:
Go here /home/user/Desktop/Certifs/OSCP/Tools/PasswordCracking/JohnTheRipper/run
./john --wordlist= /home/user/Desktop/Certifs/OSCP/Tools/Wordlist/Bruteforce/rockyou.txt --fork= 4 --format= krb5tgs /home/user/Desktop/HackTheBox/VM/Active/kerberos_hashes.txt