Diver
Password Cracking | Hard - Diver
Challenge
A password hash was retrieved that needs to be cracked. We have received intel that the password is vehicles but have some sort of rule affecting them.
Target Hash: 7d2eec8b9a92dd4d4dde274e09031129
Solution
Solution Guide
Hashcat Rules
Welcome to the world of hashcat rules! Before we get started, let me explain what rules are in hashcat and how they work.Hashcat rules are used to manipulate and transform wordlists during password-cracking attempts. They apply specific modifications (such as capitalization, reversing, appending numbers, or replacing characters) to existing dictionary words, effectively expanding your dictionary to cover variations of passwords without needing enormous lists. As such, they can only work with dictionary attacks (-a 0
).
How Do Hashcat Rules Work?
Hashcat rules are simple yet powerful instructions that tell hashcat how to modify words from a wordlist. Each rule can consist of multiple commands, executed sequentially.
Common hashcat rule operations include:
l
- Lowercase all lettersu
- Uppercase all lettersc
- Capitalize the first letterr
- Reverse the word$X
- Append character 'X' at the end^X
- Prepend character 'X' at the beginningsXY
- Replace all instances of 'X' with 'Y'
These simple commands can be chained together to form more complex rules.
Here's how you'd typically structure a hashcat command using rules:
hashcat -m 0 -a 0 hash.txt wordlist.txt -r rules.rule
If you want to learn more in depth, try Rulemaker after finishing this challenge.
Alright, now let's solve this challenge. You should be able to find a wordlist with knowledge from Fusion.
When using wordlists with rules, you should always remove all spaces & special characters and convert the wordlist to lowercase beforehand
Now, we know we'll have to use a rule in hashcat. Generally, your approach should start with premade rules that are preinstalled with Hashcat. In Kali Linux, you can find them under /usr/share/hashcat/rules/
. If you explore and try some of the rule files there, you will eventually crack the hash. The challenge name is a hint to which one! Go ahead and craft your command. Reveal Final Command
hashcat -a 0 -m 0 hash.txt vehicles.txt -r /usr/share/hashcat/rules/dive.rule
You should now have cracked the password!
Credits
- Author(s): Divesh Gupta (legendile7)