Password Recovery

 

Passwords in databases or files are not stored in plaintext, they are stored in some kind of gibberish. The gibberish counterpart of a plaintext password is the hash of the password. The intuition is that it should be a straight forward process to calculate a hash from plaintext, but it should be impossible to calculate from a hash to plaintext. There are many hashing algorithms out there. Some need more computational power, some need less.

 

Due to the fact, that you cannot calculate from hash to plaintext you need to create a lot of possible candidates from a wordlist or with some other method and then compare the results with your hash which should be recovered. If you find a match, you found the plaintext.

Don't use any kind of information provided on this page for illegal activities!

Hash Generator Software

There are several ways to create a hash from a plaintext input. You can use some online generators or use a tool on your PC or Mobile.

Online Hash Generator Service

Online services is one way to create a hash from some plaintext input. But do never use these hashes for passwords! You don't know what and if these services do log some information about your input. It is a common practise to create large databases of hash:plaintext pairs.

https://hashgenerator.de/

Offline Hash Generator Software

A better, or more precisely, a more secure way to create a hash from plaintext is to use an offline tool on your PC.

A good collection of hashing software

MDXfind

MDXfind is one of my favourite hashing tools, you can run large numbers of unsolved hashes, using many algorithms, against large numbers of plaintext words, and it can also create hashes from plaintext.

You can find a guide how to use it here: MDXfindbible and here: https://www.techsolvency.com/pub/bin/mdxfind/

 

Create single MD5 hash (1 round) from pipe:

(Windows)

echo "password" | mdxfind.exe -h "^MD5$" -h "!salt,!user" -z -f nul -i 1 stdin 2>&1

(Linux)

echo -n "password" | ./mdxfind.static -h "^MD5$" -h "!salt,!user" -z -f /dev/null -i 1 stdin 2>&1

 

Create several MD5 hashes (1 round) from file:

(Windows)

cat plain-list.txt | mdxfind.exe -h "^MD5$" -h "!salt,!user" -z -f nul -i 1 stdin > hashes-from-plain.txt

(Linux)

cat plain-list.txt | ./mdxfind.static -h '^MD5$' -h '!salt,!user' -z -f /dev/null -i 1 stdin > hashes-from-plain.txt

 

Hash Lookup Services

 Just find your hash in databases

https://md5hashing.net/

https://hashes.org

https://en.everybodywiki.com/Hashes.org

https://www.patreon.com/scoray

https://crackstation.net/

https://hashes.com/

https://www.whatsmyip.org/hash-lookup/

Hash Toolkit

https://www.onlinehashcrack.com/

https://hashkiller.io

 

h8mail is an email OSINT and breach hunting tool using different breach and reconnaissance services like the ones shown above.

https://github.com/khast3x/h8mail

https://leak-lookup.com

 

 

 

Offline Hash Cracking

How to crack hashes

hashcat

 Password Cracking with Hashcat

 

Hashtopolis is a multi-platform client-server tool for distributing hashcat tasks to multiple computers.

https://github.com/s3inlc/hashtopolis

 

mdxfind

MDXfind, the CPU-based hash-cracking tool

MDXfind Bible

A Quick Look at MDXFIND

 

John the Ripper

https://www.openwall.com/john/doc/

https://www.openwall.com/john/doc/EXAMPLES.shtml

Online Hash Cracking Services

Crypt-Fud

a free online hash cracker for wireless networks.

GPUHASH.me

is a paid online service for a large range of hash types. They accept cryptocurrency.

OnlineHashCrack

cracks passwords less than 8 characters for free.

CrackMyHash

is not an online service, instead a forum for hash cracking

Hashes.com

offers also an escrow service for hash cracking

 

Wordlists

A good wordlist is like the Alpha and Omega of password cracking. It is what every captain needs! There are hundreds of wordlist out there, but if you don't find a good one, all effort taken to recover the password is for nothing.

 

Weakpass offers a lot of different and very large wordlists.

https://weakpass.com/download https://weakpass.com/lists

 

Crackstation also has two nice wordlists.

https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm

 

The lists on skullsecurity are old-school yet very useful from a scientific perspective.

https://wiki.skullsecurity.org/Passwords

 

Daniel did a great job by creating these wordlist and sharing them with us. You can choose between a lot of different sets, and he keeps them up to date!

https://github.com/danielmiessler/SecLists/tree/master/Passwords

 

You also find some large lists with probable words on the following github page.

https://github.com/berzerk0/Probable-Wordlists

 

The following python script reads passwords from hashes.org and creates a wordlist.

https://github.com/GKNSB/hashes.org.py

 

https://forum.hashkiller.io/index.php?threads/insidepro-alternatives-wordlists-etc.31629/

 

PWDB - New generation of Password Mass-Analysis

https://github.com/FlameOfIgnis/Pwdb-Public

 

 

Wordlist Manipulation

An old-school post with nice and very usefull commands for wordlist manipulation.

http://adaywithtape.blogspot.com/2011/07/wordlist-manipulation-revisited.html

Create a custom wordlist with Crunch

https://www.securitynewspaper.com/2018/11/28/create-your-own-wordlist-with-crunch/

password-stretcher

https://github.com/TheTechromancer/password-stretcher

 

 

 

Deep Learning Approach for Password Guessing

https://arxiv.org/abs/1709.00440

https://github.com/philipperemy/tensorflow-1.4-billion-password-analysis/tree/master

 

More about Hashes

Hash Collector - A collection of extreme (min, max, similar to original, ...) hash values for printable ASCII texts

md5game - Collects MD5 hashes where a part of the hash and the plaintext overlap. The goal is to find MD5(x) = x.

https://cryptokait.com/2020/09/02/taking-password-cracking-to-the-next-level/

https://www.techsolvency.com/

Optimizing computation of Hash-Algorithms as an attacker - Some overview how to fasten up hash cracking

A cheat-sheet for password crackers - A lot of one-liners to extract or separate hashes from files and manipulate wordlists and more.

BreachComp: A One-Year Retrospective

Cracking Passwords with Michael McIntyre

Hash Type Frequency

Wordlist tests

https://github.com/iphelix/pack

https://hunter2.gitbook.io/darthsidious/credential-access/password-cracking-and-auditing

https://github.com/topics/cracking-hashes

https://github.com/topics/hash-cracker

 

https://gist.github.com/scottlinux/9a3b11257ac575e4f71d-ZuMi-e811322ce6b3

https://www.reddit.com/r/netsec/comments/7kqp-ZuMi-x9/recent_14_billion_password_breach_compilation_as/

https://mega.nz/file/MuJlQRaC#Rlfonl4x33JR96m0T5N5FZh5mR3-MOdjUXE-ZuMi-DYaUGBsE

Comments powered by CComment