Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. Resources
  3. Pro Tips

Pro Tips

Scheduled Pinned Locked Moved Resources
jtr
13 Posts 3 Posters 957 Views 3 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • freerouteF Offline
    freerouteF Offline
    freeroute
    Moderator Trusted
    wrote on last edited by
    #1

    Everything related to hash functions. Frequently and rarely used commands.

    1 Reply Last reply
    4
    • freerouteF Offline
      freerouteF Offline
      freeroute
      Moderator Trusted
      wrote on last edited by freeroute
      #2

      Generate hashes with John the Ripper(pass_gen.pl)
      Generate-hashes-pass_gen.pl.txt

      1 Reply Last reply
      1
      • freerouteF Offline
        freerouteF Offline
        freeroute
        Moderator Trusted
        wrote on last edited by freeroute
        #3

        A cheat-sheet for password crackers
        Source: A_cheat-sheet_for_password_crackers
        CHEAT_SHEET_unix_ninja.txt

        1 Reply Last reply
        👍
        1
        • cycloneC cyclone pinned this topic on
        • freerouteF Offline
          freerouteF Offline
          freeroute
          Moderator Trusted
          wrote on last edited by
          #4

          Information about hashes formats
          Information_about_hashes_formats.txt

          1 Reply Last reply
          👍
          0
          • freerouteF Offline
            freerouteF Offline
            freeroute
            Moderator Trusted
            wrote on last edited by freeroute
            #5

            Title: Analyze and create rules for large hashlists
            Author: hashcat's developers
            URL: https://hashcat.net/wiki/doku.php?id=hashcat
            Description: Analyze and create rules for large hashlists. In some cases, this could be useful.

            Command: hashcat -m 0 large_hash_list wordlist -g 500000 --debug-mode=1 --debug-file=new.rule

            -g, --generate-rules | Num | Generate X random rules
            --debug-file | File | Output file for debugging rules

            • [ Rule Debugging Modes ] -

              | Format
              ===+========
              1 | Finding-Rule
              2 | Original-Word
              3 | Original-Word:Finding-Rule
              4 | Original-Word:Finding-Rule:Processed-Word
              5 | Original-Word:Finding-Rule:Processed-Word:Wordlist

            oe3p32wedwO 1 Reply Last reply
            👍
            1
            • freerouteF Offline
              freerouteF Offline
              freeroute
              Moderator Trusted
              wrote on last edited by
              #6

              Title: What is the correct format of a Houzz hash for hashcat?
              Author: freeroute
              URL: https://paste.hashpwn.net/?56c460ef65322356#B1ZEbFB7qiZRymJUeGZp2ygV4pR8fdyxw5kmjeckhdVi
              Description: The correct format of Houzz hash for hashcat

              1 Reply Last reply
              👍
              1
              • freerouteF Offline
                freerouteF Offline
                freeroute
                Moderator Trusted
                wrote on last edited by
                #7

                Title: Check the candidates generated by hashcat rule file
                Author: freeroute
                URL: https://paste.hashpwn.net/?e695c3709b553d0f#BX9utL4md1xmvirutURJYycRvCqRncAyhstWGMYNj9Mt

                Description: Check the candidates generated by the Hashcat rule file.

                A1131A 1 Reply Last reply
                2
                • freerouteF freeroute

                  Title: Check the candidates generated by hashcat rule file
                  Author: freeroute
                  URL: https://paste.hashpwn.net/?e695c3709b553d0f#BX9utL4md1xmvirutURJYycRvCqRncAyhstWGMYNj9Mt

                  Description: Check the candidates generated by the Hashcat rule file.

                  A1131A Offline
                  A1131A Offline
                  A1131
                  Trusted
                  wrote on last edited by cyclone
                  #8

                  @freeroute

                  The above can be used with more words and rules to get a little bigger wordlist:

                  echo $'word1\nword2\nw0rd3' > words.txt

                  hashcat --force words.txt -r complex.rule --stdout | sort -u > candidates_words.txt

                  Amateur of mycology and hashcracking | 1x3060Ti | 1x1050Ti
                  PGP:4B0A386530D789157435DC7489138FB52FDD7FC1

                  1 Reply Last reply
                  0
                  • freerouteF freeroute

                    Title: Analyze and create rules for large hashlists
                    Author: hashcat's developers
                    URL: https://hashcat.net/wiki/doku.php?id=hashcat
                    Description: Analyze and create rules for large hashlists. In some cases, this could be useful.

                    Command: hashcat -m 0 large_hash_list wordlist -g 500000 --debug-mode=1 --debug-file=new.rule

                    -g, --generate-rules | Num | Generate X random rules
                    --debug-file | File | Output file for debugging rules

                    • [ Rule Debugging Modes ] -

                      | Format
                      ===+========
                      1 | Finding-Rule
                      2 | Original-Word
                      3 | Original-Word:Finding-Rule
                      4 | Original-Word:Finding-Rule:Processed-Word
                      5 | Original-Word:Finding-Rule:Processed-Word:Wordlist

                    oe3p32wedwO Offline
                    oe3p32wedwO Offline
                    oe3p32wedw
                    wrote on last edited by
                    #9

                    @freeroute wrote a script via chatgpt to analyze the debug file
                    Title: python script to analyze debug rule file
                    Author: ChatGPT
                    Code:

                    from collections import Counter
                    
                    # Reading data from the file
                    input_file = 'new.rule'  # Path to your input file
                    output_file = 'output.txt'  # Path to the output file where results will be saved
                    
                    # Try opening the file with a different encoding
                    try:
                        with open(input_file, 'r', encoding='utf-8') as file:
                            strings = file.readlines()
                    except UnicodeDecodeError:
                        with open(input_file, 'r', encoding='ISO-8859-1') as file:
                            strings = file.readlines()
                    
                    # Removing unnecessary spaces (e.g., newline characters)
                    strings = [line.strip() for line in strings]
                    
                    # Counting the frequency of each line
                    counter = Counter(strings)
                    
                    # Sorting lines by frequency (in descending order)
                    sorted_strings = counter.most_common()
                    
                    # Writing the sorted lines and their frequency to a new file
                    with open(output_file, 'w', encoding='utf-8') as file:
                        for line, count in sorted_strings:
                            file.write(f"{line} - {count}\n")
                    
                    print(f"Result saved in {output_file}")
                    
                    

                    Description: Simply run specifying the received file from the hashcat. In the output you will get the rules that were used most often

                    1x1660 Ti | 2x4090 | epileptic/anxiety/despair/drain | hashpwn <3

                    1 Reply Last reply
                    👍
                    1
                    • freerouteF Offline
                      freerouteF Offline
                      freeroute
                      Moderator Trusted
                      wrote on last edited by
                      #10

                      Title: ETH hash parameters for hashcat
                      Description: For speed, don't use -w 4, add the below manually
                      -n 64 -u 8 -T 1024 --force

                      -n, --kernel-accel - Manual workload tuning, set outerloop step size to X
                      -u, --kernel-loops - Manual workload tuning, set innerloop step size to X
                      -T, --kernel-threads - Manual workload tuning, set thread count to X
                      --force - Ignore warnings

                      1 Reply Last reply
                      👍
                      0
                      • freerouteF Offline
                        freerouteF Offline
                        freeroute
                        Moderator Trusted
                        wrote on last edited by cyclone
                        #11

                        Title: HTTP Digest access authentication algorithm
                        Hashcat mode: -m 11400 - SIP digest authentication (MD5)
                        Format:

                        $sip$*192.168.100.100*192.168.100.121*username*asterisk*REGISTER*sip*192.168.100.121**2b01df0b****MD5*ad0520061ca07c120d7e8ce696a6df2d
                        $sip$***Mufasa*[email protected]*GET**/dir/index.html**dcd98b7102dd2f0e8b11d0f600bfb0c093*0a4f113b*00000001*auth*MD5*6629fae49393a05397450978507c4ef1
                        
                        $sip$*[URI_SERVER]*[URI_CLIENT]*[USERNAME]*[REALM]*[METHOD]*[URI_PREFIX]*[URI_RESOURCE]*[URI_SUFFIX]*[NONCE_SERVER]*[NONCE_CLIENT]*[NONCE_COUNT]*[QOP]*[DIRECTIVE]*[MD5]
                        

                        Sources:
                        https://github.com/hashcat/hashcat/issues/1021
                        https://hashcat.net/forum/thread-7054-post-37744.html#pid37744

                        1 Reply Last reply
                        0
                        • freerouteF Offline
                          freerouteF Offline
                          freeroute
                          Moderator Trusted
                          wrote on last edited by
                          #12

                          Title:rulechef - a markov rule generator
                          Author:Cynosure Prime
                          Description:Analyses a ruleset for hashcat/mdxfind/john the ripper and iteratively generates rules based on markov chains created from the input rules. Users can specify additional parameters such as the min/max rule operations, chain probability and starting chain limits.

                          This tool was written in an attempt to craft better quality rules as opposed to the usual rule stacking or randomly generating rules.
                          Source:https://github.com/Cynosureprime/rulechef

                          1 Reply Last reply
                          👍
                          0
                          • freerouteF Offline
                            freerouteF Offline
                            freeroute
                            Moderator Trusted
                            wrote on last edited by
                            #13

                            Title: Plundering and pillaging password and passphrase plains for profit
                            Author: Will Hunt
                            Description: In this talk we'll look beyond the basics of cracking and arm you with further attacks when you feel you're out of options. We'll look at multiple paths for cracking delimited passphrases and review when you'd want to use these attacks and why. Target-specific markov tables will be shown to illustrate how you could be missing out on elusive plains without even realising it, as well as getting the best bang for your buck out of your rule-based attacks by identifying non-efficient operations. Then, after reviewing transliterated attacks and hash shucking, we'll wrap up with the release of a tool to help you automate the initial heavy lifting of your attack cycles.

                            Will Hunt
                            Will (@Stealthsploit) has been in infosec for over 15 years, co-founded In.security in 2018 and as a pentester has helped secure many organisations through technical security services and training. Will's a Black Hat trainer and has taught and spoken at several conferences and events, as well as helping run Password Village at DEFCON. Will also assists the UK government in various technical, educational and advisory capacities. Before Will was a security consultant he was an experienced digital forensics consultant and trainer.

                            Security Fest is an inspiring and unique IT security conference held in Gothenburg, Sweden. The event is an excellent opportunity to learn more about IT security, and a great way to connect with both the renowned international speakers, and the other attendees.

                            Source: https://www.youtube.com/watch?v=ArLhwcpWMdU

                            1 Reply Last reply
                            🔥
                            2
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            Who's Online [Full List]

                            6 users active right now (3 members and 3 guests).
                            hashpwn-bot, cyclone, bloodybunny008

                            Board Statistics

                            Our members have made a total of 4.0k posts in 150 topics.
                            We currently have 260 members registered.
                            Please welcome our newest member, iceman.
                            The most users online at one time was 49 on Thursday, December 26, 2024.

                            • Login

                            • Don't have an account? Register

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent