AI News Hub Logo

AI News Hub

Offline Hash Cracking Tutorial: Crack the Hash Room Walkthrough | TryHackMe

DEV Community
Md. Ibrahim Reza Rabbi

Now, We will jump to the 2nd level of this -> Question-1: Hash: F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0C85 Question-2: Hash: 1DFECA0C002AE40B8619ECF94819CC1B Now, this hash is tricky though it is showing MD5 or any version of MD but it is "NTLM". So, we should not blindly trust the top guess of this tools rather than sequentially test all the hash until we will get the hash cracked. Question-3: Hash: $6$aReallyHardSalt$6WKUTqzq.UQQmrm0p/T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02. Salt: aReallyHardSalt Now, it is bit tricky. Go to hashcat_wiki and search the $6$ tag and understand which mode is this. -> Question-4: Hash: e5d8870e5bdd26602cab8dbe07a942c8669e56d6 Salt: tryhackme now if we look at the hashcat_wiki the Sha-1 with salt is the mode 110 and also see the format sha1($pass.$salt) -> But, unfortunately it didn't work :) then I sequentially search for other sha1 and salt type hash mode and I found this -> ┌──(kali㉿kali)-[~/password] └─$ echo 'e5d8870e5bdd26602cab8dbe07a942c8669e56d6:tryhackme' > hash.txt ┌──(kali㉿kali)-[~/password] └─$ hashcat -m 160 -a 0 hash.txt /usr/share/wordlists/rockyou.txt hashcat (v7.1.2) starting OpenCL API (OpenCL 3.0 PoCL 6.0+debian Linux, None+Asserts, RELOC, SPIR-V, LLVM 18.1.8, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project] ==================================================================================================================================================== * Device #01: cpu-sandybridge-12th Gen Intel(R) Core(TM) i5-12450H, 1466/2933 MB (512 MB allocatable), 4MCU