ShifraBlog
  • Shifra Blog 😀
  • Math🔬
    • Math Articles
      • Applied Mathematics
  • Write Up📝
    • INE ePTS
      • Black Box 1
      • Black Box 2
      • Black Box 3
      • Black Box 3 - Remastered
    • Log4j Vulnerability (Log4Shell)
  • PenTesting🧪
    • eJPT
      • 🔎Reconnaissance
      • 🐱‍💻Google Dorks
      • 🌐Web Attacks
      • ⚙️System Attacks
      • 📶Network Attacks
      • 🔐Password Attacks
      • 💻Networking
      • Pentesting Approach
  • Tools 🧰
    • Nmap
    • Shodan
    • 🐱‍👤Hashcat
    • 🐲Hydra
    • 🔍Nessus
    • 🔬Metasploit
      • Meterpreter
    • 👂Netcat
  • ☁️Database / Servers
    • 👨‍💻Access Tricks
  • 🛂Physical Pentesting
    • 🔑Lost Passwords
Powered by GitBook
On this page
  • Password Cracking
  • 💪BruteForce Attack
  • 📖Dictionary Attack
  • 🌈 Rainbow Tables
  • HashCat

Was this helpful?

  1. PenTesting🧪
  2. eJPT

🔐Password Attacks

Various techniques and tools to attack passwords.

Previous📶Network AttacksNext💻Networking

Last updated 3 years ago

Was this helpful?

Password when stored must be encrypted a Cryptographic Hashing Algorithm (one-way encryption algorithm) is used to protect from reading by malicious users.

Password Cracking

guessing process where attacker hash the gussed pass and compare it to the hashing value optianed from the breached DB.

💪BruteForce Attack

Will go through every single Capital/small letter + Number + Symbol combination until it finds the password, always successful given enough time.

John the Ripper:

Support Bruteforce+Dictionary attacks agianst Passwords DB+ parallelization.

support nearly 100 Encryption formats

jhon --list=formates

Assuming we got from breached Linux system:

  • /etc/passwd -> users accounts info.

  • /etc/shadow -> actual hashed passwords.

we would like to bruteforce certain users with John

1- John needs both info in the same file (unshadow comes with it):

unshadow passwd.txt shadow.txt > crackme.txt

2- use this to pick a certain user to crack(pure BruteForce):

john -incremental -users:<users_list> <File_to_crack>

3- show the cracked password:

john --show <Cracked_file>

📖Dictionary Attack

Dictionary of common passwords to test.

make sure your password is secure when it's long (preventing BruteForce) + random (preventing Dictionary), check out this online testing tool:

Mangling Words: variation on 'cat' could be: cat12, caT, CAT, c@t ...etc. another thing that Cracking tools provide.

John the Ripper:

to use dictionary attacks in John:

john -wordlist= <custom_worldlist> -rules <file_to_crack>
john crack_me.txt

-rules: to apply mangling. -users= : may also be used to provide list of users. • By not providing a custome worldlist you will use the defualt one.

Some helpful Password Dictionaries:

apt -y install seclists

will find your passwords in : /usr/share/seclists/Passwords/leak

🌈 Rainbow Tables

rtgen <Hash_func> <charset> <plaintext_len_min> <plaintext_len_max> <table_index> <chain_len> <chain_num> <part_index>
rtgen sha256 loweralpha-numeric 1 10 0 1000 4000 0

1 10: from a to j. table index: 0 1000 is the length of the chain (how many times we hash ->reduce)

Crackin Pss protected MS Office files:

assuming you want to crack a .docx extract the hash first then crack it:

/usr/share/john/office2john.py MS_Word_Document.docx > hash

office2john.pyis a python script used to extract crackable information from the Microsoft Office .docx file.

john --wordlist=<worldlist> <hash>

Another tool that can carry out all the 3 prev. mentioned attacks to crack passwords.

to crack Windowds Authentication Passwords, tool avilabe for all major OS.

Another tool is Create a Rainbow Table:

HashCat

SecList
Really Great explaination of what's a Rainbow Table.
ophcrack:
RainbowCrack
🐱‍👤Hashcat
How Secure Is My Password? | Password Strength CheckerSecurity.org
https://project-rainbowcrack.com/table.htmproject-rainbowcrack.com
Estimating Password Cracking TimesBetter Buys
Logo
pseudo-code for BruteForce Algo (unkown pass + length)
Why Dict atttack faste than BruteForce exmaple.
Logo