# Crack the Hash

**Date:** 22, April, 2021

**Author:** Dhilip Sanjay S

***

[Click Here](https://tryhackme.com/room/crackthehash) to go to the TryHackMe room.

## Level 1

### 48bb6e862e54f2a795ffc4e541caed4d

* **Answer:** easy
* **Steps to Reproduce:** Use any online hashcracker or hashcat 48bb6e862e54f2a795ffc4e541caed4d:easy

***

### CBFDAC6008F9CAB4083784CBD1874F76618D2A97

* **Answer:** password123
* **Steps to Reproduce:** Use any online hashcracker or hashcat cbfdac6008f9cab4083784cbd1874f76618d2a97:password123

***

### 1C8BFE8F801D79745C4631D09FFF36C82AA37FC4CCE4FC946683D7B336B63032

* **Answer:** letmein
* **Steps to Reproduce:** Use any online hashcracker or hashcat 1c8bfe8f801d79745c4631d09fff36c82aa37fc4cce4fc946683d7b336b63032:letmein

***

### $2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom

* **Answer:** bleh
* **Steps to Reproduce:** Use hashcat $2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom:bleh

***

### 279412f945939ba78ce0758d3fd83daa

* **Answer:** Eternity22
* **Steps to Reproduce:** Use any online hashcracker or hashcat 279412f945939ba78ce0758d3fd83daa:Eternity22

***

## Level 2

### Hash: F09EDCB1FCEFC6DFB23DC3505A882655FF77375ED8AA2D1C13F640FCCC2D0C85

* **Answer:** paule
* **Steps to Reproduce:** Use Hashcat f09edcb1fcefc6dfb23dc3505a882655ff77375ed8aa2d1c13f640fccc2d0c85:paule

***

### Hash: 1DFECA0C002AE40B8619ECF94819CC1B

* **Answer:** n63umy8lkf4i
* **Steps to Reproduce:** Use Hashcat 1dfeca0c002ae40b8619ecf94819cc1b:n63umy8lkf4i

***

### Hash: $6$aReallyHardSalt$6WKUTqzq.UQQmrm0p/T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02. Salt: aReallyHardSalt Rounds: 5

* **Answer:** waka99
* **Steps to Reproduce:** Use Hashcat sha512crypt (1800) 6$aReallyHardSalt$6WKUTqzq.UQQmrm0p/T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02.:waka99

***

### Hash: e5d8870e5bdd26602cab8dbe07a942c8669e56d6. Salt: tryhackme

* **Answer:** 481616481616
* **Steps to Reproduce:** Use Hashcat HMAC-SHA1 e5d8870e5bdd26602cab8dbe07a942c8669e56d6:tryhackme:481616481616

***

## References

* [HashCat reference format](https://hashcat.net/wiki/doku.php?id=example_hashes)
* [HashCat Manual](https://hashcat.net/wiki/doku.php?id=hashcat)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://blog.dhilipsanjay.in/ctfs/tryhackme/tryhackme/crackthehash.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
