Offline - Password Cracking
MITRE ATT&CK™ Brute Force: Password Cracking - Technique T1110.002
Last updated
Was this helpful?
MITRE ATT&CK™ Brute Force: Password Cracking - Technique T1110.002
Last updated
Was this helpful?
When obtaining hashed passwords, we must run various plaintext passwords through the hashing algorithm and compare the returned hash to the target hash. This password attack technique is known as password cracking.
Cracking hashes is usually done on attacker-controlled systems outside of the target network, as this technique does not require direct interaction with the target.
Hashcat offers different modes that you can use to crack a specific algorithm. When you crack a hash with hashcat, the first step is to find the right mode.
To do this, we can use the -h
or --example-hashes
arguments. Alternatively we may refers to the online resource.
We may use hashid
against a hash to do identify the hash type
Then we can use following commands to retrieve that the Hashcat mode is 7900
We may directly use the --example-hash
argument to find the right mode. Using the previous hash, we can easily find the 7900 mode.
We may perform a brute-force attack against a target hash using Hashcat charsets:
Following commands can be used
We may perform a dictionary attack against a target hash using Hashcat
Rule-Based attacks assume the attacker knows something about the password policy. Rules are applied to create passwords within the guidelines of the given password policy and should, in theory, only generate valid passwords. Using pre-existing wordlists may be useful when generating passwords that fit a policy — for example, manipulating or 'mangling' a password such as password
: p@ssword
, Pa$$word
, Passw0rd
, and so on.
We can use hashcat to perform hybrid attacks using both a dictionary and a mask and even rules.
To generate a rule-based wordlists, .
has rule sets located at /usr/share/hashcat/rules/
. To create your own rules, you may check this .
has a config file that contains rule sets, which is located at /etc/john/john.conf
or /opt/john/john.conf
depending on your distro or how john was installed. You can read /etc/john/john.conf and look for List.Rules to see all the available rules:
is a website that can be used for Rainbow Table Attacks.