🥷
Offensive Security
  • Shells and stuffs
    • Bind Shell
    • Reverse Shell
    • TTY Shell
    • File Transfer
    • Handmade Network Scan
  • Services enumeration
    • DNS Enumeration
    • SMB Enumeration
    • NFS Enumeration
  • Linux Privilege Escalation
    • Useful Tools
    • Hijack X11 session
    • Linux capabilities
    • LXC membership
  • Windows Privilege Escalation
    • Useful Tools
  • Password Attacks
    • Build Wordlist
    • Network Service Attacks
    • Password Cracking
  • Active Directory
    • AD CS
  • OSINT
    • Google Dorks
Powered by GitBook
On this page
  • John The Ripper
  • Basic usage
  • With rules
  • KoreLogic rules
  • Hashcat
  • Basic usage
  • With rules
  • One rule to rule them all
  1. Password Attacks

Password Cracking

John The Ripper

Basic usage

john --wordlist=wordlist.txt hash.txt --format=NT

With rules

It is also possible to apply (all) rules to the provided passwords to cover a wider range of possibilities.

John rules are stored in /etc/john/john.conf.

john --wordlist=wordlist.txt hash.txt --format=NT --rules=All

KoreLogic rules

In order to add KoreLogic rules to john default rules, proceed as follows:

curl https://raw.githubusercontent.com/SpiderLabs/KoreLogic-Rules/master/kore-logic-rules-full.txt >> /etc/john/john.conf

Hashcat

Basic usage

hashcat -a 0 -m 1000 hash.txt wordlist.txt

With rules

hashcat -a 0 -m 1000 hash.txt wordlist.txt -r /usr/share/hashcat/rules/best64.rule

One rule to rule them all

hashcat -a 0 -m 1000 hash.txt wordlist.txt -r OneRuleToRuleThemAll.rule
PreviousNetwork Service AttacksNextAD CS

Last updated 2 years ago

Github repository:

https://github.com/NotSoSecure/password_cracking_rules