Incremental mode - Bruteforcing all possible combinations of characters
Rule mode - Uses wordlist mode by adding some pattern to the string. (Eg: current year, special characters, etc)
Mutations
Border mutation - combinations of digits and special symbols at the beginning or end or both.
Freak mutation - replace letters with similar looking special symbols
Case mutation - all variations of uppercase/lowercase letters for any characters.
Order mutation - Character order is reversed.
Repetition mutation - Same group of characters are repeated several times.
Vowels mutation - vowels are omitted or capitalized
Strip mutation - one or several characters are removed.
Swap mutation - some characters are swapped places.
Duplicate mutation - some characters are duplicated.
Delimiter mutation - delimiters are addded between characters.
2d5c517a4f7a14dcb38329d228a7d18a3b78ce83
Answer: moonligh56
Steps to Reproduce: Use john
$ cat john-local.conf
[List.Rules:THM01]
$[0-9]$[0-9]
$ john hash.txt --format=raw-sha1 --wordlist=/usr/share/wordlists/passwords/10k-most-common.txt --rules=THM01
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-SHA1 [SHA1 256/256 AVX2 8x])
Press 'q' or Ctrl-C to abort, almost any other key for status
moonligh56 (?)
1g 0:00:00:00 DONE (2021-04-23 15:52) 10.00g/s 5653Kp/s 5653Kc/s 5653KC/s hotrats56..jayhawks56
Use the "--show --format=Raw-SHA1" options to display all of the cracked passwords reliably
Session completed
Custom wordlist generation
ed91365105bba79fdab20c376d83d752
Answer: mOlo$$u$
Steps to Reproduce:
$ john md5.txt --format=Raw-MD5 --wordlist=/usr/share/wordlists/misc/dogs_custom.txt
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-MD5 [MD5 256/256 AVX2 8x3])
Press 'q' or Ctrl-C to abort, almost any other key for status
mOlo$$u$ (?)
1g 0:00:00:00 DONE (2021-04-23 16:12) 50.00g/s 12100p/s 12100c/s 12100C/s aDvanced..yOrk$hire
Use the "--show --format=Raw-MD5" options to display all of the cracked passwords reliably
Session completed
Use CeWL - What is the last word of the list?
Answer: Information
Steps to Reproduce:
$ cewl -d 2 -w $(pwd)/example.txt https://example.org
CeWL 5.5.0 (Grouping) Robin Wood ([email protected]) (https://digi.ninja/)
cat example.txt
Example
Domain
domain
for
use
This
illustrative
examples
documents
You
may
this
literature
without
prior
coordination
asking
permission
More
information
$ john combi_hash.txt --format=Raw-MD5 --wordlist=combination.txt
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-MD5 [MD5 256/256 AVX2 8x3])
Press 'q' or Ctrl-C to abort, almost any other key for status
1551-li (?)
1g 0:00:00:02 DONE (2021-04-23 16:28) 0.3584g/s 10161Kp/s 10161Kc/s 10161KC/s 1551-g..1551-nz
Use the "--show --format=Raw-MD5" options to display all of the cracked passwords reliably
Session completed
Time to crack the hashes
1) b16f211a8ad7f97778e5006c7cecdf31
Answer: Zachariah1234*
Steps to Reproduce:
First download common male namelist using wordlistctl.
$ john --format=Raw-MD5 hash1.txt --wordlist=/usr/share/wordlists/usernames/malenames-usa-top1000.txt --rules=task01
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-MD5 [MD5 256/256 AVX2 8x3])
Press 'q' or Ctrl-C to abort, almost any other key for status
0g 0:00:00:06 0.41% (ETA: 19:20:20) 0g/s 7024Kp/s 7024Kc/s 7024KC/s Lane03+4+..Curtis03+50
Zachariah1234* (?)
1g 0:00:00:33 DONE (2021-04-23 18:56) 0.03018g/s 7760Kp/s 7760Kc/s 7760KC/s Alden1234*..Ivan1234(
Use the "--show --format=Raw-MD5" options to display all of the cracked passwords reliably
Session completed
2) 7463fcb720de92803d179e7f83070f97
Answer: Angelita35!
Steps to Reproduce:
First download common female namelist using wordlistctl.
Run john along with l33t rule and the newly generated wordlist.
john --format=Raw-MD5 hash3.txt --wordlist=/usr/share/wordlists/misc/cities_final.txt --rules=l33t
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-MD5 [MD5 256/256 AVX2 8x3])
Press 'q' or Ctrl-C to abort, almost any other key for status
Tl@xc@l@ncing0 (?)
1g 0:00:00:02 DONE (2021-04-23 20:11) 0.4237g/s 728949p/s 728949c/s 728949C/s Vestv@[email protected]@
Use the "--show --format=Raw-MD5" options to display all of the cracked passwords reliably
Session completed
4) a3a321e1c246c773177363200a6c0466a5030afc
Answer: DavIDgUEtTApAn
Steps to Reproduce:
Use John with NT rule, Raw-SHA1
john --format=Raw-SHA1 hash4.txt --wordlist=hash4_name.txt --rules=NT
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-SHA1 [SHA1 256/256 AVX2 8x])
Press 'q' or Ctrl-C to abort, almost any other key for status
DavIDgUEtTApAn (?)
1g 0:00:00:00 DONE (2021-04-23 20:27) 8.333g/s 38333p/s 38333c/s 38333C/s DavIDgUEttapAn..DavIDgUEtTAPAn
Use the "--show --format=Raw-SHA1" options to display all of the cracked passwords reliably
Session completed
5) d5e085772469d544a447bc8250890949
Answer:
Steps to Reproduce:
Use Lyricpass to generate song list of the favourite singer Adele.
$ lyricpass.py -a Adele
[+] Looking up artist Adele
[+] Found 345 songs for artists Adele
[+] All done! 345/345...
Raw lyrics: raw-lyrics-2021-04-23-20.30.50
Passphrases: wordlist-2021-04-23-20.30.50
Use John with rule r (for reversed character order)
john --format=Raw-MD5 hash5.txt --wordlist=raw-lyrics-2021-04-23-20.30.50 --rules=r
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-MD5 [MD5 256/256 AVX2 8x3])
Press 'q' or Ctrl-C to abort, almost any other key for status
uoy ot miws ot em rof peed oot ro ediw oot si revir oN (?)
1g 0:00:00:00 DONE (2021-04-23 20:40) 16.66g/s 6400p/s 6400c/s 6400C/s tnew yrots eht woh si sihT..egdirb eht rednu retaw tnia evol ruo taht yaS
Use the "--show --format=Raw-MD5" options to display all of the cracked passwords reliably
Session completed
6) 377081d69d23759c5946a95d1b757adc
Answer: +17215440375
Steps to Reproduce:
Use pnwgen to with prefix - +1721 (Sint Maarten code) - Refer Wikipedia
$ ./pnwgen.py
INFO:--------------------------------
INFO:Creating a wordlist file...
Choose the number of digits in generated raw output:
(min 4, max 10, 7 (by default) - press ENTER)
>>> 7
INFO:7 digits raw output was choosed
INFO:generating +1721***
INFO:Finished!!!
Use john with raw-md5 format.
$ john --format=Raw-MD5 hash6.txt --wordlist=phoneno.txt
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-MD5 [MD5 256/256 AVX2 8x3])
Press 'q' or Ctrl-C to abort, almost any other key for status
+17215440375 (?)
1g 0:00:00:00 DONE (2021-04-23 20:55) 1.030g/s 5608Kp/s 5608Kc/s 5608KC/s +17215440128..+17215440511
Use the "--show --format=Raw-MD5" options to display all of the cracked passwords reliably
Session completed
Generate the wordlist with 1,2,3,4 and 5 repetition of the words using python script.
file1 = open('hash8_scrapped.txt', 'r')
file2 = open('hash8_final.txt', 'w')
while True:
l = file1.readline()
if not l:
break
l = l.strip()
for i in range(1, 6):
file2.write(l*i+'\n')
file1.close()
file2.close()
Use john with Raw-Blake2
john --format=Raw-Blake2 hash8 -wordlist=hash8_final.txt
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-Blake2 [BLAKE2b 512 128/128 AVX])
Press 'q' or Ctrl-C to abort, almost any other key for status
hackinghackinghackinghacking (?)
1g 0:00:00:00 DONE (2021-04-23 21:33) 33.33g/s 10666p/s 10666c/s 10666C/s LyonLyon..manymanymanymanymany
Use the "--show" option to display all of the cracked passwords reliably
Session completed
Steps to Reproduce: Use john or HashCat with sha512crypt
$ john --format=sha512crypt hash9.txt --wordlist=/usr/share/wordlists/rockyou.txtUsing default input encoding: UTF-8
Loaded 1 password hash (sha512crypt, crypt(3) $6$ [SHA512 256/256 AVX2 4x])
Cost 1 (iteration count) is 5000 for all loaded hashes
Press 'q' or Ctrl-C to abort, almost any other key for status
kakashi1 (?)
1g 0:00:00:17 DONE (2021-04-23 16:34) 0.05701g/s 1590p/s 1590c/s 1590C/s mothers..citlali
Use the "--show" option to display all of the cracked passwords reliably
Session completed