Leet Sheet
  • Leet Sheet
  • TODO
  • Reconnaissance
    • Automated Reconnaissance
    • Domains
    • Scour the Web
    • Metadata
  • Web App Hacking
    • Enumeration
      • Webserver Virtualhost Subdomains
      • Common Identifiers
      • Web Fuzzing
      • Directory Enumeration
        • Automated Directory Enumeration
        • Manual Directory Enumeration
      • Automated Web Technology Detection
    • User Attacks
      • CORS Misconfigurations
      • DNS Rebinding
      • Open Redirect
      • Clickjacking
      • Cross Site Request Forgery (CSRF)
      • Session Fixation
      • XSS/Cross Site Scripting
      • CSS Injection
      • HTML Injection
      • Phishing
    • Database Attacks
      • SQL Injection
      • Get a Shell From DB Connection
    • Server Attacks
      • Collisions
      • Server Side Request Forgery
        • Redis SSRF
      • Insecure Direct Object Reference
      • Timing-Based Side-Channel Attacks
      • Attacking Authentication Methods
        • JWT Attacks
        • Brute Forcing Web Forms
      • Loose Comparisons
      • Unrestricted File Upload
      • Insecure Deserialization
      • Command Injection
      • Path Traversal
      • File Inclusion
      • Server-Side Template Injection
      • XML External Entities Injection (XXE)
      • Server Misconfigurations
      • Parser Inconsistencies
      • Bypassing WAFs
    • DNS Attacks
    • Cloud Attacks
      • Amazon Web Services
    • Interesting Outdated Attacks
      • SQL Truncation
  • Network Hacking
    • General Enumeration
    • RPC
    • LDAP
    • SMB
    • SNMP
    • WMI
    • SSH
    • Kerberos
    • NTLM
    • Man-In-the-Middle (MITM)
    • WinRM
  • Post Exploitation
    • Windows
      • CLI Tips
      • Shells
      • Windows Script Host
      • Windows Privilege Escalation
        • Enumeration
        • JuicyPotato/RottenPotato
        • Kernel Exploits
        • Unquoted Service Paths
      • Active Directory
      • Dumping Passwords
      • NTLM Hash Theft
    • Linux
      • Port Forwarding
      • Shells
      • Linux Privilege Escalation
        • Enumeration
        • SUID Bit
        • Dot (.) In PATH
        • Escape From Restricted Shell
        • Symlink Trickery
        • Wildcard Injection
        • Docker group/LXD group
        • Password Reuse
      • Backdoors
    • Docker Container
    • General
  • Various
    • CVEs
    • SSH Agent Hijacking
    • Password Cracking
    • Cryptography
    • Non-Hacking
    • Malware
    • Forensics
      • Reading Keystrokes from USB PCAP Data
  • Binary Exploitation
    • Resources
    • Base Knowledge
    • Format String Exploits
    • Stack Smashing
    • Heap Exploits
    • Time-of-Check to Time-of-Use (TOCTOU)
    • Shellcode
    • Decompilation
    • Debugging
    • Exploit Mitigations and Protections
    • Exploit Protection Bypassing
    • Passing Input
    • Fuzzing
    • Automatic Exploitation
  • Physical Security
    • Mechanical Locks
    • Electronic Locks
    • Other Attacks
    • Destructive Entry
    • Elevator Attacks
  • Social Engineering
    • Phishing
Powered by GitBook
On this page
  • Wordlist Generation
  • Combinations Using Python
  • Rules
  • Cracking Tools
  • Hate_crack
  • Hashcat

Was this helpful?

  1. Various

Password Cracking

Wordlist Generation

Combinations Using Python

This is just a simple script for trying out all two word combinations of words in a list:

from itertools import combinations

lines = [ 'one', 'two', 'three' ]
strippedlines=[]
for line in lines:
  strippedlines.append(line.strip())

for combination in list(combinations(strippedlines, 2)):
  print('{}{}'.format(combination[0], combination[1]))

Rules

You can use hashcat to generate a wordlist based on an existing wordlist and some rules. Here is an example with the bes64 ruleset:

hashcat --force initial_wordlist.txt -r /usr/share/hashcat/rules/best64.rule --stdout > rules_best64_wordlist.txt

Note: Ippsec uses the InsidePro-PasswordsPro.rule. That's probably a really good one.

Cracking Tools

Hate_crack

Tool for automating/combining different types of offline password cracking methods.

Hashcat

Utilizes the GPU, which is good, as it cracks very fast.

hashcat -a 0 -m HASH_MODE -o output.txt input_hashes.txt wordlist.txt

Important attack modes (-a):

  • 0: dictionary attack

Hash modes (-m):

  • Look them up in the hashcat manual

You can crack hashes with rules applied to a wordlist:

hashcat -m HASH_MODE crackthis.hash  wordlist.txt -r rulesfile.txt --debug-mode=1 --debug-file=matched.
PreviousSSH Agent HijackingNextCryptography

Last updated 2 years ago

Was this helpful?

GitHub - trustedsec/hate_crack: A tool for automating cracking methodologies through Hashcat from the TrustedSec team.GitHub
Logo