🌊 How to Crack Passwords with Hashcat
















Let's start with the MD5 Hash Concept. Say our password's "kiaorasecurity", we can actually generate a hash for it. Now what would the MD5 hash value of this? Allow me to demonstrate 😊

type: echo -n "kiaorasecurity" | md5sum 


A hacker will have to crack that hash value to get to our password 😎 Let's now get to the salting concept. Say we add 0707 to the tail of your password: "kiaorasecurity0707"



It generated a new hash for it. It'll give the hacker some extra time to go through that 😉 

Now let's get to Encryption. It's when you convert data to something else. Hashing is irreversible, Encryption can be Decrypted. Let's go through a simple example. 


The \x04\x1c\ blahblah is the encrypted version of kiaorasecurity. "oursecret" is the key the we can use to decrypt this. Let's try it. 

Trippy right? Through the key the password was decrypted. 

Anyways 😊 Let's get to being able to identify hashes. My mates were quick to clown MD5 for being an obvious one. I secretly don't see it 😅 Although there's actually a tool in Python that can do this for us anyway. It's called Hashid! 












Comments

Popular Posts