root🥷hassans-sec:~#

Hacking....

View on GitHub

hashid 48bb6e862e54f2a795ffc4e541caed4d

md5
❯ john --format=raw-md5 --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt

hashid CBFDAC6008F9CAB4083784CBD1874F76618D2A97

sha-1
❯ john --format=raw-sha1 --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt

❯ hashid 1C8BFE8F801D79745C4631D09FFF36C82AA37FC4CCE4FC946683D7B336B63032

sha-256
❯ john --format=raw-sha256 --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt

$2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom

The hash $2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom is a bcrypt hash.

Breakdown of the Bcrypt Hash

grep -E '^.{4}$' /usr/share/wordlists/rockyou.txt > four_char_words.txt 

Explanation

❯ hashcat -m 3200 -a 0 hashes.txt four_char_words.txt 

❯ hashid 279412f945939ba78ce0758d3fd83daa

md4

online-cracker

Level 2

F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0C85

1DFECA0C002AE40B8619ECF94819CC1B

Hash: $6$aReallyHardSalt$6WKUTqzq.UQQmrm0p/T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02.

Salt: aReallyHardSalt

the hash you provided is indeed salted. The salt is aReallyHardSalt. Both John the Ripper and Hashcat are capable of handling salted hashes.

grep -E '^.{6}$' /usr/share/wordlists/rockyou.txt > six_char_words.txt 
❯ hashcat -m 1800 -a 0 hashes.txt six_char_words.txt

Explanation of Hashcat Command

Hash: e5d8870e5bdd26602cab8dbe07a942c8669e56d6

Salt: tryhackme

To crack a salted HMAC-SHA1 hash using Hashcat, you need to specify the correct hash mode for salted HMAC-SHA1. The mode for salted HMAC-SHA1 in Hashcat is 160. Below are the steps to crack the hash e5d8870e5bdd26602cab8dbe07a942c8669e56d6 with the salt tryhackme.

❯ hashcat -m 160 e5d8870e5bdd26602cab8dbe07a942c8669e56d6:tryhackme /usr/share/wordlists/rockyou.txt