Using pre-generated word lists to guess passwords. Effective because many people use common words. Defend by using unique, complex passwords and two-factor authentication.
Brute Force
Trying every possible character combination. Very slow but thorough. Longer passwords (8+ characters) with mixed character types significantly increase cracking time.
Rainbow Table Attacks
Using pre-computed hash-to-password conversion tables. Faster than brute force but limited to passwords already in the table.
Default Credentials
Many applications, or almost all of them, often come with default credentials after installation.
Default credentials can also be found in the product documentation.
NTLM authentication protocol vulnerability allowing authentication using just the password hash instead of plaintext credentials. Can bypass the need for password cracking by directly using harvested hashes for lateral movement.
Hashcat is the world’s fastest and most advanced password recovery tool. It’s compatible with CPUs, GPUs, and other hardware accelerators across different operating systems.
Hashcat can generate password variations using mutation rules, employing a specialized syntax for defining characters, words, and their possible modifications.
The comprehensive list of this syntax is available in Hashcat’s official documentation.
Here’s an example of syntax.
Function
Description
:
Do nothing.
l
Lowercase all letters.
u
Uppercase all letters.
c
Capitalize the first letter and lowercase others.
sXY
Replace all instances of X with Y.
$X
Append character X to end.
Here’s an example of rules.
custom.rule
:cso0c so0sa@c sa@c sa@ so0$!$! c$! so0$! sa@$! c so0$! c sa@$! so0 sa@$! c so0 sa@
# Generating rule-based wordlisthashcat --force passwords.txt -r custom.rule --stdout > mut_password.list# List all the rulesls /usr/share/hashcat/rules/
Hydra
Hydra is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add.
John the Ripper is a fast password cracker primarily designed to detect weak Unix passwords. The “Jumbo” version expands this capability with support for hundreds of additional hash types and ciphers.
Cracking Files
John is also capable of cracking password-protected files. It has additional tools that process the files into hashes that John can work with.
# Turns file into hashespdf2john file.pdf > file.hash# Crack using Johnjohn file.hash# ORjohn --wordlist=/wordlists/passwords.txt file.hash
Here’s a list that includes for files cracking but not all.
Tool
Description
pdf2john
Converts PDF documents for John
ssh2john
Converts SSH private keys for John
mscash2john
Converts MS Cash hashes for John
keychain2john
Converts OS X keychain files for John
rar2john
Converts RAR archives for John
pfx2john
Converts PKCS#12 files for John
truecrypt_volume2john
Converts TrueCrypt volumes for John
keepass2john
Converts KeePass databases for John
vncpcap2john
Converts VNC PCAP files for John
putty2john
Converts PuTTY private keys for John
zip2john
Converts ZIP archives for John
hccap2john
Converts WPA/WPA2 handshake captures for John
office2john
Converts MS Office documents for John
wpa2john
Converts WPA/WPA2 handshakes for John
# List all the toolslocate *2john*# 2John Full list of toolshttps://medium.com/@1200km/2john-9bb0bd44ed64