# Crack The Hash

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbIfAQlfHug5A5RHwdQ%2F-MbJ2Rkn9XbUy96Ld2mp%2Fimage.png?alt=media\&token=78c3891e-3e8e-4e11-9662-9a216e4fb790)

## Tools

[Hash-identifier](https://tools.kali.org/password-attacks/hash-identifier)

[Crackstation](https://crackstation.net/)

## Task 1: Level 1

### Question 1

48bb6e862e54f2a795ffc4e541caed4d

I am going to use [crackstation ](https://crackstation.net/)for this question.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbJ31p3mEiKMVeoWsFN%2F-MbJ4vOzWirtuuNpZAQi%2Fimage.png?alt=media\&token=ea3bfcb6-45ae-4e9e-90a4-ec72a29950cd)

The answer is "easy"

### Question 2

CBFDAC6008F9CAB4083784CBD1874F76618D2A97

I am going to use crackstation again for this task.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbJ31p3mEiKMVeoWsFN%2F-MbJ5F8Cs0LoHsw8L-vv%2Fimage.png?alt=media\&token=591c74c1-8e21-47d7-9347-e06fa1fa92af)

The answer is "password123"

### Question 3

1C8BFE8F801D79745C4631D09FFF36C82AA37FC4CCE4FC946683D7B336B63032

Going to use crackstation again.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbJ31p3mEiKMVeoWsFN%2F-MbJ5VM0YfQqbnNu27c0%2Fimage.png?alt=media\&token=555abc95-84c2-4b03-b36d-2a1bfd7a80a1)

The answer is "letmein"

### Question 4

$2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom

For this question crackstation won't work, so I used [Hash Analyzer](https://www.tunnelsup.com/hash-analyzer/) to identify the hash and cracked it with hashcat.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbJ5WL_-TPURAVeDumE%2F-MbJ6QOzbmeLr1kbiIXW%2Fimage.png?alt=media\&token=9b15cb43-c9a2-430b-bd4a-667e69da7915)

So the hash type is bcrypt, so lets crack this with hashcat. First we need to save the hash into a file (I used hash.txt as the name)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbJ6RcG3VYRyOWKIQdO%2F-MbJ7JsqhuyLMHL6gR7g%2Fimage.png?alt=media\&token=4731676f-7bb4-4eed-821f-6db397ad8f28)

It takes a while, the answer is "bleh"

### Question 5

279412f945939ba78ce0758d3fd83daa

I used crackstation for this

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbJ7LE_mIb8hZV0iV6O%2F-MbJ7qxQDXYbnv3howVn%2Fimage.png?alt=media\&token=6ecf5133-413f-4a1e-88a2-29a8fcc1d19b)

The answer is "Eternity22"

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbJ7LE_mIb8hZV0iV6O%2F-MbJ95hmrzN9afVjYaEE%2Fimage.png?alt=media\&token=3e8980e8-4eff-428d-8ea0-9fa428a04c4b)

## Task 2: Level 2

### Question 1

F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0C85

I used crackstation for this

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbJ7LE_mIb8hZV0iV6O%2F-MbJ8VoXUwsv2uG4uyVv%2Fimage.png?alt=media\&token=7211605e-9689-48c6-935a-17d80326523b)

The answer is "paule"

### Question 2

1DFECA0C002AE40B8619ECF94819CC1B

I used crackstation for this

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbJ7LE_mIb8hZV0iV6O%2F-MbJ8jJ5Eb4y1d7zYLPZ%2Fimage.png?alt=media\&token=9d54b69e-334a-4e25-828e-1fbd9270e0d4)

### Question 3

Hash: $6$aReallyHardSalt$6WKUTqzq.UQQmrm0p/T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02.

Salt: aReallyHardSalt

For this question I used hashcat, but first we need to identify what type of hash it is. For that I used hash type identifier.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbJ9JEa7aPTPzjicdtz%2F-MbJ9zhmYKOSsWC-c3KO%2Fimage.png?alt=media\&token=a5f4b3f9-91e9-4171-930f-176642e23ee3)

And now that we know the hash type, we can use hashcat to crack the hash.

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbJ9JEa7aPTPzjicdtz%2F-MbJJFADqJwkrBFPw1wO%2Fimage.png?alt=media\&token=0b9b8ca2-e44f-44be-af9e-1a2826573d0b)

It takes a lot of time, the answer is "waka99"

### Question 4

e5d8870e5bdd26602cab8dbe07a942c8669e56d6

I used Hash Type Identifier to identify the hash

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbJ9JEa7aPTPzjicdtz%2F-MbJJbagoZ03QU001WhT%2Fimage.png?alt=media\&token=d7df1ebb-5624-4bd4-bef4-972ce9283b84)

Now I will use hashcat to crack the hash. It takes a lot of time so the answer is "481616481616"

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-MbJ9JEa7aPTPzjicdtz%2F-MbJJtZF3fKDkZTBuS_2%2Fimage.png?alt=media\&token=5d939cf9-c285-4ee3-bdc1-1d901ba48fc1)
