Hashcat

Tools/Skills: CLI, Hashcat, Hash Types

SYNOPSIS

A file with a hashed password needs to be decoded by first identifying the type of hash and, then, using hashcat.

I identified the hash by comparing the hash in the file to a list of different hashes and what they look like. Once identified, I selected the necessary options to identify the type of hash (-m 18200) and the type of attack (-a 0), and joined those options with a list options I needed to include to slow down the command (-w 1 -u 1 --kernel-accel 1 --kernel-loops 1 --force).

SOLUTION & PROCESS

  1. Hash Type

    1. Compare the hash file in hash.txt (cat hash.txt) to hashes in the link provided.

      1. In hash.txt there was a unique beginning, including an “@” symbol.

      2. Based on the “@”, I narrowed the type down to Kerberos 5 etype 23 AS-REP

      3. I missed that it said AS-REP, so I had to try a few of the options out before I figured out the exact type and the password.

  2. Input correct command

    hashcat -w 1 -u 1 --kernel-accel 1 --kernel-loops 1 --force -m 18200 -a 0 hash.txt password_list.txt

    *Many of these options were provided in instructions to slow down the command

    *Identified attack type (dictionary, -a 0)

    *Identified hash type (-m 18200), hash file, password file

  3. Identify cracked password

    • After the password was cracked, it took me a few more minutes to figure out the answer was provided at the end of the hash in the results rather than after “Candidates #1”

      PASSWORD: IluvC4ndyC4nes!

  4. Input answer to /bin/runtoanswer

SUMMARY

Hash Type: Kerberos 5 AS-REP etype 23 AS-REP

Command: hashcat -w 1 -u 1 --kernel-accel 1 --kernel-loops 1 --force -m 18200 -a 0 hash.txt password_list.txt

Password: IluvC4ndyC4nes!


Example Prompts:

  • What does this command do? `-w 1 -u 1 --kernel-accel 1 --kernel-loops 1`

  • How do I use hashcat?

  • Can I use hashcat without knowing the hash type?

Last updated