Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. Resources
  3. Pro Tips

Pro Tips

Scheduled Pinned Locked Moved Resources
jtr
14 Posts 3 Posters 1.1k Views 3 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • freerouteF Offline
    freerouteF Offline
    freeroute
    Moderator Trusted
    wrote on last edited by freeroute
    #2

    Generate hashes with John the Ripper(pass_gen.pl)
    Generate-hashes-pass_gen.pl.txt

    1 Reply Last reply
    1
    • freerouteF Offline
      freerouteF Offline
      freeroute
      Moderator Trusted
      wrote on last edited by freeroute
      #3

      A cheat-sheet for password crackers
      Source: A_cheat-sheet_for_password_crackers
      CHEAT_SHEET_unix_ninja.txt

      1 Reply Last reply
      👍
      1
      • cycloneC cyclone pinned this topic on
      • freerouteF Offline
        freerouteF Offline
        freeroute
        Moderator Trusted
        wrote on last edited by
        #4

        Information about hashes formats
        Information_about_hashes_formats.txt

        1 Reply Last reply
        👍
        0
        • freerouteF Offline
          freerouteF Offline
          freeroute
          Moderator Trusted
          wrote on last edited by freeroute
          #5

          Title: Analyze and create rules for large hashlists
          Author: hashcat's developers
          URL: https://hashcat.net/wiki/doku.php?id=hashcat
          Description: Analyze and create rules for large hashlists. In some cases, this could be useful.

          Command: hashcat -m 0 large_hash_list wordlist -g 500000 --debug-mode=1 --debug-file=new.rule

          -g, --generate-rules | Num | Generate X random rules
          --debug-file | File | Output file for debugging rules

          • [ Rule Debugging Modes ] -

            | Format
            ===+========
            1 | Finding-Rule
            2 | Original-Word
            3 | Original-Word:Finding-Rule
            4 | Original-Word:Finding-Rule:Processed-Word
            5 | Original-Word:Finding-Rule:Processed-Word:Wordlist

          oe3p32wedwO 1 Reply Last reply
          👍
          1
          • freerouteF Offline
            freerouteF Offline
            freeroute
            Moderator Trusted
            wrote on last edited by
            #6

            Title: What is the correct format of a Houzz hash for hashcat?
            Author: freeroute
            URL: https://paste.hashpwn.net/?56c460ef65322356#B1ZEbFB7qiZRymJUeGZp2ygV4pR8fdyxw5kmjeckhdVi
            Description: The correct format of Houzz hash for hashcat

            1 Reply Last reply
            👍
            1
            • freerouteF Offline
              freerouteF Offline
              freeroute
              Moderator Trusted
              wrote on last edited by
              #7

              Title: Check the candidates generated by hashcat rule file
              Author: freeroute
              URL: https://paste.hashpwn.net/?e695c3709b553d0f#BX9utL4md1xmvirutURJYycRvCqRncAyhstWGMYNj9Mt

              Description: Check the candidates generated by the Hashcat rule file.

              A1131A 1 Reply Last reply
              2
              • freerouteF freeroute

                Title: Check the candidates generated by hashcat rule file
                Author: freeroute
                URL: https://paste.hashpwn.net/?e695c3709b553d0f#BX9utL4md1xmvirutURJYycRvCqRncAyhstWGMYNj9Mt

                Description: Check the candidates generated by the Hashcat rule file.

                A1131A Offline
                A1131A Offline
                A1131
                Trusted
                wrote on last edited by cyclone
                #8

                @freeroute

                The above can be used with more words and rules to get a little bigger wordlist:

                echo $'word1\nword2\nw0rd3' > words.txt

                hashcat --force words.txt -r complex.rule --stdout | sort -u > candidates_words.txt

                Amateur of mycology and hashcracking | 1x3060Ti | 1x1050Ti
                PGP:4B0A386530D789157435DC7489138FB52FDD7FC1

                1 Reply Last reply
                0
                • freerouteF freeroute

                  Title: Analyze and create rules for large hashlists
                  Author: hashcat's developers
                  URL: https://hashcat.net/wiki/doku.php?id=hashcat
                  Description: Analyze and create rules for large hashlists. In some cases, this could be useful.

                  Command: hashcat -m 0 large_hash_list wordlist -g 500000 --debug-mode=1 --debug-file=new.rule

                  -g, --generate-rules | Num | Generate X random rules
                  --debug-file | File | Output file for debugging rules

                  • [ Rule Debugging Modes ] -

                    | Format
                    ===+========
                    1 | Finding-Rule
                    2 | Original-Word
                    3 | Original-Word:Finding-Rule
                    4 | Original-Word:Finding-Rule:Processed-Word
                    5 | Original-Word:Finding-Rule:Processed-Word:Wordlist

                  oe3p32wedwO Offline
                  oe3p32wedwO Offline
                  oe3p32wedw
                  wrote on last edited by
                  #9

                  @freeroute wrote a script via chatgpt to analyze the debug file
                  Title: python script to analyze debug rule file
                  Author: ChatGPT
                  Code:

                  from collections import Counter
                  
                  # Reading data from the file
                  input_file = 'new.rule'  # Path to your input file
                  output_file = 'output.txt'  # Path to the output file where results will be saved
                  
                  # Try opening the file with a different encoding
                  try:
                      with open(input_file, 'r', encoding='utf-8') as file:
                          strings = file.readlines()
                  except UnicodeDecodeError:
                      with open(input_file, 'r', encoding='ISO-8859-1') as file:
                          strings = file.readlines()
                  
                  # Removing unnecessary spaces (e.g., newline characters)
                  strings = [line.strip() for line in strings]
                  
                  # Counting the frequency of each line
                  counter = Counter(strings)
                  
                  # Sorting lines by frequency (in descending order)
                  sorted_strings = counter.most_common()
                  
                  # Writing the sorted lines and their frequency to a new file
                  with open(output_file, 'w', encoding='utf-8') as file:
                      for line, count in sorted_strings:
                          file.write(f"{line} - {count}\n")
                  
                  print(f"Result saved in {output_file}")
                  
                  

                  Description: Simply run specifying the received file from the hashcat. In the output you will get the rules that were used most often

                  1x1660 Ti | 2x4090 | epileptic/anxiety/despair/drain | hashpwn <3

                  1 Reply Last reply
                  👍
                  1
                  • freerouteF Offline
                    freerouteF Offline
                    freeroute
                    Moderator Trusted
                    wrote on last edited by
                    #10

                    Title: ETH hash parameters for hashcat
                    Description: For speed, don't use -w 4, add the below manually
                    -n 64 -u 8 -T 1024 --force

                    -n, --kernel-accel - Manual workload tuning, set outerloop step size to X
                    -u, --kernel-loops - Manual workload tuning, set innerloop step size to X
                    -T, --kernel-threads - Manual workload tuning, set thread count to X
                    --force - Ignore warnings

                    1 Reply Last reply
                    👍
                    0
                    • freerouteF Offline
                      freerouteF Offline
                      freeroute
                      Moderator Trusted
                      wrote on last edited by cyclone
                      #11

                      Title: HTTP Digest access authentication algorithm
                      Hashcat mode: -m 11400 - SIP digest authentication (MD5)
                      Format:

                      $sip$*192.168.100.100*192.168.100.121*username*asterisk*REGISTER*sip*192.168.100.121**2b01df0b****MD5*ad0520061ca07c120d7e8ce696a6df2d
                      $sip$***Mufasa*[email protected]*GET**/dir/index.html**dcd98b7102dd2f0e8b11d0f600bfb0c093*0a4f113b*00000001*auth*MD5*6629fae49393a05397450978507c4ef1
                      
                      $sip$*[URI_SERVER]*[URI_CLIENT]*[USERNAME]*[REALM]*[METHOD]*[URI_PREFIX]*[URI_RESOURCE]*[URI_SUFFIX]*[NONCE_SERVER]*[NONCE_CLIENT]*[NONCE_COUNT]*[QOP]*[DIRECTIVE]*[MD5]
                      

                      Sources:
                      https://github.com/hashcat/hashcat/issues/1021
                      https://hashcat.net/forum/thread-7054-post-37744.html#pid37744

                      1 Reply Last reply
                      0
                      • freerouteF Offline
                        freerouteF Offline
                        freeroute
                        Moderator Trusted
                        wrote on last edited by
                        #12

                        Title:rulechef - a markov rule generator
                        Author:Cynosure Prime
                        Description:Analyses a ruleset for hashcat/mdxfind/john the ripper and iteratively generates rules based on markov chains created from the input rules. Users can specify additional parameters such as the min/max rule operations, chain probability and starting chain limits.

                        This tool was written in an attempt to craft better quality rules as opposed to the usual rule stacking or randomly generating rules.
                        Source:https://github.com/Cynosureprime/rulechef

                        1 Reply Last reply
                        👍
                        0
                        • freerouteF Offline
                          freerouteF Offline
                          freeroute
                          Moderator Trusted
                          wrote on last edited by
                          #13

                          Title: Plundering and pillaging password and passphrase plains for profit
                          Author: Will Hunt
                          Description: In this talk we'll look beyond the basics of cracking and arm you with further attacks when you feel you're out of options. We'll look at multiple paths for cracking delimited passphrases and review when you'd want to use these attacks and why. Target-specific markov tables will be shown to illustrate how you could be missing out on elusive plains without even realising it, as well as getting the best bang for your buck out of your rule-based attacks by identifying non-efficient operations. Then, after reviewing transliterated attacks and hash shucking, we'll wrap up with the release of a tool to help you automate the initial heavy lifting of your attack cycles.

                          Will Hunt
                          Will (@Stealthsploit) has been in infosec for over 15 years, co-founded In.security in 2018 and as a pentester has helped secure many organisations through technical security services and training. Will's a Black Hat trainer and has taught and spoken at several conferences and events, as well as helping run Password Village at DEFCON. Will also assists the UK government in various technical, educational and advisory capacities. Before Will was a security consultant he was an experienced digital forensics consultant and trainer.

                          Security Fest is an inspiring and unique IT security conference held in Gothenburg, Sweden. The event is an excellent opportunity to learn more about IT security, and a great way to connect with both the renowned international speakers, and the other attendees.

                          Source: https://www.youtube.com/watch?v=ArLhwcpWMdU

                          1 Reply Last reply
                          🔥
                          2
                          • freerouteF Offline
                            freerouteF Offline
                            freeroute
                            Moderator Trusted
                            wrote last edited by
                            #14

                            Title: hcxcommic.
                            ZeroBeat: ZeroBeat
                            Source: https://github.com/ZerBea/hcxtools
                            Description:It takes as input a 22000 hashcat -o file and a hash file and converts it to a HEX:PLAIN file.
                            Accepted by hashmob if the MIC is in both input files present. That makes it much easier to submit findings to hashmob.net.

                            Download a 22000 left list from hashmob either via web interface (filter by 22000)
                            https://hashmob.net/hashlists/user or by ID (get if via web interface (https://hashmob.net/hashlists/user)

                            I prefer via ID: (12612 is the ID shown in hm web interface:
                            $ wget https://cdn.hashmob.net/hashlists/12589/125892.left

                            Run hashcat against this list and use its -o option to store the findings to file!

                            Either use your own word list
                            $ hashcat -m 22000 -o 12589.found 12589.left wordlist
                            ...
                            Recovered........: 8/3358 (0.24%) Digests (total), 8/3358 (0.24%) Digests (new), 8/2857 (0.28%) Salts
                            ...

                            Or get one from wpa-sec
                            $ wget https://wpa-sec.stanev.org/dict/cracked.txt.gz
                            $ hashcat -m 22000 -o 12589.found 12589.left wordlist

                            Generate the hash file accepted by hm:
                            $ hcxcommic 12589.found 12589.left > hm.found

                            Submit hm.found to hashmob (choose 22000).

                            Note: hasmob marks some hashes as invalid.
                            That's because hashmob has a massif(!) missing new line (\0a) problem! It has been reported.

                            1 Reply Last reply
                            👍
                            1
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            Who's Online [Full List]

                            4 users active right now (1 members and 3 guests).
                            hashpwn-bot

                            Board Statistics

                            Our members have made a total of 4.7k posts in 152 topics.
                            We currently have 270 members registered.
                            Please welcome our newest member, immolatje.
                            The most users online at one time was 49 on Thursday, December 26, 2024.

                            • Login

                            • Don't have an account? Register

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent