📓
Pentesting
  • Writeups
  • HackTheBox
    • Easy Machines
      • Beep Writeup
      • Shocker Writeup
      • Lame Writeup
      • Jerry Writeup
      • Legacy Writeup
      • Blue Writeup
  • TryHackMe
    • Walkthroughs: Easy
      • CC: Steganography
      • Cryptography for Dummies
      • Cross-site Scripting
      • SQL Injection Lab
      • SQL Injection
      • ZTH: Web 2
      • SSRF
      • XXE
      • Authenticate
      • Injection
      • Blaster
      • The Cod Caper
      • Hardening Basics Part 1
      • What the Shell?
      • Game Zone
      • Upload Vulnerabilities
      • Bolt
      • Erit Securus 1
      • CC: Pentesting
      • JavaScript Basics
      • OverPass 2 - Hacked
      • Linux: Local Enumeration
      • Ice
      • Linux Backdoors
      • Avengers Blog
      • DNS in Detail
      • Putting it all together
      • Kenobi
      • Common Linux Privesc
      • Network Services 2
      • Network Services
      • The Hacker Methodology
      • The Find command
      • HTTP in Detail
      • Web Fundamentals
      • How Websites Work
      • Introductory Networking
    • Challenges (CTF): Easy
      • VulNet: Roasted
      • VulNet: Internal
      • Git Happens
      • Kiba
      • VulNet: Node
      • Memory Forensics
      • Smag Grotto
      • Investigating Windows
      • Cat Pictures
      • Juicy Details
      • Anthem
      • Tony The Tiger
      • Jack-of-All-Trades
      • JPGChat
      • Blueprint
      • All in One
      • Gotta Catch'em All
      • Mustacchio
      • Break Out The Cage
      • HeartBleed
      • Poster
      • Madness
      • Source
      • Thompson
      • Library
      • Magician
      • Anonforce
      • Dav
      • GLITCH
      • Fowsniff CTF
      • Team
      • H4cked
      • Easy Peasy
      • ColddBox: Easy
      • Archangel
      • Cyborg
      • Chocolate Factory
      • Brute It
      • Year of the Rabbit
      • ChillHack
      • Gaming Server
      • Brooklyn Nine Nine
      • Wgel CTF
      • Tomghost
      • ToolsRus
      • Skynet
      • Startup
      • Agent Sudo
      • Lian-Yu
      • OhSINT
      • Overpass
      • Crack The Hash
      • Ignite
      • Inclusion
      • Bounty Hunter
      • LazyAdmin
      • RootMe
      • Pickle Rick
      • Basic Pentesting
      • Simple CTF
  • Crackmes.one
    • 1 Difficulty Rating
      • easyAF
      • Easy Keyg3nme
Powered by GitBook
On this page
  • Tools
  • Task 1: Level 1
  • Question 1
  • Question 2
  • Question 3
  • Question 4
  • Question 5
  • Task 2: Level 2
  • Question 1
  • Question 2
  • Question 3
  • Question 4

Was this helpful?

  1. TryHackMe
  2. Challenges (CTF): Easy

Crack The Hash

PreviousOverpassNextIgnite

Last updated 3 years ago

Was this helpful?

Tools

Task 1: Level 1

Question 1

48bb6e862e54f2a795ffc4e541caed4d

The answer is "easy"

Question 2

CBFDAC6008F9CAB4083784CBD1874F76618D2A97

I am going to use crackstation again for this task.

The answer is "password123"

Question 3

1C8BFE8F801D79745C4631D09FFF36C82AA37FC4CCE4FC946683D7B336B63032

Going to use crackstation again.

The answer is "letmein"

Question 4

$2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom

So the hash type is bcrypt, so lets crack this with hashcat. First we need to save the hash into a file (I used hash.txt as the name)

It takes a while, the answer is "bleh"

Question 5

279412f945939ba78ce0758d3fd83daa

I used crackstation for this

The answer is "Eternity22"

Task 2: Level 2

Question 1

F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0C85

I used crackstation for this

The answer is "paule"

Question 2

1DFECA0C002AE40B8619ECF94819CC1B

I used crackstation for this

Question 3

Hash: $6$aReallyHardSalt$6WKUTqzq.UQQmrm0p/T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02.

Salt: aReallyHardSalt

For this question I used hashcat, but first we need to identify what type of hash it is. For that I used hash type identifier.

And now that we know the hash type, we can use hashcat to crack the hash.

It takes a lot of time, the answer is "waka99"

Question 4

e5d8870e5bdd26602cab8dbe07a942c8669e56d6

I used Hash Type Identifier to identify the hash

Now I will use hashcat to crack the hash. It takes a lot of time so the answer is "481616481616"

I am going to use for this question.

For this question crackstation won't work, so I used to identify the hash and cracked it with hashcat.

Crackstation
crackstation
Hash Analyzer
Hash-identifier