Passwords in databases or files are not stored in plaintext, they are stored in some kind of gibberish. The gibberish counterpart of a plaintext password is the hash of the password. The intuition is that it should be a straight forward process to calculate a hash from plaintext, but it should be impossible to calculate from a hash to plaintext. There are many hashing algorithms out there. Some need more computational power, some need less.
Due to the fact, that you cannot calculate from hash to plaintext you need to create a lot of possible candidates from a wordlist or with some other method and then compare the results with your hash which should be recovered. If you find a match, you found the plaintext.
Don't use any kind of information provided on this page for illegal activities!
Hash Generator Software
There are several ways to create a hash from a plaintext input. You can use some online generators or use a tool on your PC or Mobile.
Online Hash Generator Service
Online services is one way to create a hash from some plaintext input. But do never use these hashes for passwords! You don't know what and if these services do log some information about your input. It is a common practise to create large databases of hash:plaintext pairs.
Offline Hash Generator Software
A better, or more precisely, a more secure way to create a hash from plaintext is to use an offline tool on your PC.
A good collection of hashing software
MDXfind
MDXfind is one of my favourite hashing tools, you can run large numbers of unsolved hashes, using many algorithms, against large numbers of plaintext words, and it can also create hashes from plaintext.
You can find a guide how to use it here: MDXfindbible and here: https://www.techsolvency.com/pub/bin/mdxfind/
Create single MD5 hash (1 round) from pipe:
(Windows)
echo "password" | mdxfind.exe -h "^MD5$" -h "!salt,!user" -z -f nul -i 1 stdin 2>&1
(Linux)
echo -n "password" | ./mdxfind.static -h "^MD5$" -h "!salt,!user" -z -f /dev/null -i 1 stdin 2>&1
Create several MD5 hashes (1 round) from file:
(Windows)
cat plain-list.txt | mdxfind.exe -h "^MD5$" -h "!salt,!user" -z -f nul -i 1 stdin > hashes-from-plain.txt
(Linux)
cat plain-list.txt | ./mdxfind.static -h '^MD5$' -h '!salt,!user' -z -f /dev/null -i 1 stdin > hashes-from-plain.txt
Hash Lookup Services
Just find your hash in databases
https://en.everybodywiki.com/Hashes.org
https://www.patreon.com/scoray
https://www.whatsmyip.org/hash-lookup/
https://www.onlinehashcrack.com/
h8mail is an email OSINT and breach hunting tool using different breach and reconnaissance services like the ones shown above.
https://github.com/khast3x/h8mail
Offline Hash Cracking
hashcat
Password Cracking with Hashcat
Hashtopolis is a multi-platform client-server tool for distributing hashcat tasks to multiple computers.
https://github.com/s3inlc/hashtopolis
mdxfind
MDXfind, the CPU-based hash-cracking tool
John the Ripper
https://www.openwall.com/john/doc/
https://www.openwall.com/john/doc/EXAMPLES.shtml
Online Hash Cracking Services
a free online hash cracker for wireless networks.
is a paid online service for a large range of hash types. They accept cryptocurrency.
cracks passwords less than 8 characters for free.
is not an online service, instead a forum for hash cracking
offers also an escrow service for hash cracking
Wordlists
A good wordlist is like the Alpha and Omega of password cracking. It is what every captain needs! There are hundreds of wordlist out there, but if you don't find a good one, all effort taken to recover the password is for nothing.
Weakpass offers a lot of different and very large wordlists.
https://weakpass.com/download https://weakpass.com/lists
Crackstation also has two nice wordlists.
https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm
The lists on skullsecurity are old-school yet very useful from a scientific perspective.
https://wiki.skullsecurity.org/Passwords
Daniel did a great job by creating these wordlist and sharing them with us. You can choose between a lot of different sets, and he keeps them up to date!
https://github.com/danielmiessler/SecLists/tree/master/Passwords
You also find some large lists with probable words on the following github page.
https://github.com/berzerk0/Probable-Wordlists
The following python script reads passwords from hashes.org and creates a wordlist.
https://github.com/GKNSB/hashes.org.py
https://forum.hashkiller.io/index.php?threads/insidepro-alternatives-wordlists-etc.31629/
PWDB - New generation of Password Mass-Analysis
https://github.com/FlameOfIgnis/Pwdb-Public
Wordlist Manipulation
An old-school post with nice and very usefull commands for wordlist manipulation.
http://adaywithtape.blogspot.com/2011/07/wordlist-manipulation-revisited.html
Create a custom wordlist with Crunch
https://www.securitynewspaper.com/2018/11/28/create-your-own-wordlist-with-crunch/
password-stretcher
https://github.com/TheTechromancer/password-stretcher
Deep Learning Approach for Password Guessing
https://arxiv.org/abs/1709.00440
https://github.com/philipperemy/tensorflow-1.4-billion-password-analysis/tree/master
More about Hashes
Hash Collector - A collection of extreme (min, max, similar to original, ...) hash values for printable ASCII texts
md5game - Collects MD5 hashes where a part of the hash and the plaintext overlap. The goal is to find MD5(x) = x.
https://cryptokait.com/2020/09/02/taking-password-cracking-to-the-next-level/
Optimizing computation of Hash-Algorithms as an attacker - Some overview how to fasten up hash cracking
A cheat-sheet for password crackers - A lot of one-liners to extract or separate hashes from files and manipulate wordlists and more.
BreachComp: A One-Year Retrospective
Cracking Passwords with Michael McIntyre
https://github.com/iphelix/pack
https://hunter2.gitbook.io/darthsidious/credential-access/password-cracking-and-auditing
https://github.com/topics/cracking-hashes
https://github.com/topics/hash-cracker
https://gist.github.com/scottlinux/9a3b11257ac575e4f71d-ZuMi-e811322ce6b3
https://www.reddit.com/r/netsec/comments/7kqp-ZuMi-x9/recent_14_billion_password_breach_compilation_as/
https://mega.nz/file/MuJlQRaC#Rlfonl4x33JR96m0T5N5FZh5mR3-MOdjUXE-ZuMi-DYaUGBsE

Comments powered by CComment