recommended hash cracker for os x

Re: recommended hash cracker for os x

Post by WestHFR on Fri Jan 14, 2011 8:00 pm
([msg=52186]see Re: recommended hash cracker for os x[/msg])

Well, I found the hash in just a few seconds. That part was easy if you know anything about website/google. However, trying to find a good hash cracker was a pain, and took awhile. I don't run Windows on any of my computers, they are all Ubuntu except for my *laptop* which run Backtrack 4-r2. Anyways, for others out there that have Linux the best cracker for this hash in my opinion, is lcrack "Lepton's Crack". It is the only thing I could find that would/could crack this type of hash. John the Ripper by default wont work. You have to add modules for the MD* hash type, where lcrack just works.
http://usuarios.multimania.es/reinob/

It's as simple as:
lcrack -m m** -xb+ -o CrackedPass.txt TheHash.txt

Where -m is the hash method, md4, md5, sha1, and so on.
-xb+ Means run incremental (brute-force) mode.
-o is the file to output the Cracked Password to.
TheHash.txt is the file you put the hash in you want to crack.

It took me about 10 seconds to crack it.

idk if this is a spoiler or not, if so someone please remove it. However, for it to work you have to add a username before the hash. Otherwise it doesn't recognize it as a hashed password.
WestHFR
New User
New User
 
Posts: 2
Joined: Sun Jan 09, 2011 7:29 pm
Blog: View Blog (0)


Re: recommended hash cracker for os x

Post by D_HunterEnz0 on Tue Jan 25, 2011 3:47 pm
([msg=52864]see Re: recommended hash cracker for os x[/msg])

How come even though i only load 1 hash it says:
Code: Select all
mode: null password, loaded 7 passwords
mode: incremental, loaded 7 passwords


something to do with the .txt file? or is this normal?
D_HunterEnz0
New User
New User
 
Posts: 1
Joined: Tue Jan 25, 2011 5:33 am
Blog: View Blog (0)


Re: recommended hash cracker for os x

Post by disaster_voice on Fri Feb 04, 2011 5:22 pm
([msg=53174]see Re: recommended hash cracker for os x[/msg])

D_HunterEnz0 wrote:How come even though i only load 1 hash it says:
Code: Select all
mode: null password, loaded 7 passwords
mode: incremental, loaded 7 passwords


something to do with the .txt file? or is this normal?


Same thing happened to me except it said 2 passwords. Did you get the right password out of it?
lcrack figured out the right password for me, but I don't get how it did, providing lcrack thought it had two hashes.

[Edit:]
Well anyway, I not only figured out how to do this mission, but in the process of doing so, learned a whole lot about my OS, terminal and *nix commands. So yeah, this was a productive endeavor.
User avatar
disaster_voice
New User
New User
 
Posts: 11
Joined: Wed Nov 24, 2010 5:23 pm
Blog: View Blog (0)


Re: recommended hash cracker for os x

Post by Zaitsev11 on Sat Jul 02, 2011 11:28 pm
([msg=59340]see Re: recommended hash cracker for os x[/msg])

I'd just like to say that I was having a difficult time cracking the hash until I realized that the format MUST be:
Loginname:Hashvalue
After about an hour of brute forcing I was like "why isn't this working?!" and tried bruteing a 2 char password I made up and it didn't work. This was because I was only trying it with the hash. Sorry if this is TMI but I felt people should know lol
-Z
Zaitsev11
New User
New User
 
Posts: 4
Joined: Sat Jul 02, 2011 11:21 pm
Blog: View Blog (0)


Re: recommended hash cracker for os x

Post by Fryie on Sun Feb 05, 2012 2:29 pm
([msg=64132]see Re: recommended hash cracker for os x[/msg])

WestHFR wrote:John the Ripper by default wont work.

true, but you can just download the jumbo edition, which will work. (you just have to run one make command, so nothing too hard)
Fryie
New User
New User
 
Posts: 3
Joined: Thu Feb 02, 2012 6:16 am
Blog: View Blog (0)


Re: recommended hash cracker for os x

Post by maybach on Sun Apr 08, 2012 10:06 pm
([msg=65551]see Re: recommended hash cracker for os x[/msg])

WestHFR wrote:Well, I found the hash in just a few seconds. That part was easy if you know anything about website/google. However, trying to find a good hash cracker was a pain, and took awhile. I don't run Windows on any of my computers, they are all Ubuntu except for my *laptop* which run Backtrack 4-r2. Anyways, for others out there that have Linux the best cracker for this hash in my opinion, is lcrack "Lepton's Crack". It is the only thing I could find that would/could crack this type of hash. John the Ripper by default wont work. You have to add modules for the MD* hash type, where lcrack just works.
http://usuarios.multimania.es/reinob/

It's as simple as:
lcrack -m m** -xb+ -o CrackedPass.txt TheHash.txt

Where -m is the hash method, md4, md5, sha1, and so on.
-xb+ Means run incremental (brute-force) mode.
-o is the file to output the Cracked Password to.
TheHash.txt is the file you put the hash in you want to crack.

It took me about 10 seconds to crack it.

idk if this is a spoiler or not, if so someone please remove it. However, for it to work you have to add a username before the hash. Otherwise it doesn't recognize it as a hashed password.


Thank you for this and the explanation.
maybach
New User
New User
 
Posts: 2
Joined: Tue Apr 03, 2012 4:46 pm
Blog: View Blog (0)


Re: recommended hash cracker for os x

Post by tinkerC on Sun Apr 22, 2012 7:40 pm
([msg=65875]see Re: recommended hash cracker for os x[/msg])

So I was having issues.... No methods seem to be enabled! I am running Mac OS X 10.4.11 Server Edition.

Thanks,

- tinkerC

# ./lcrack -m m** -xb+ -o ../CrackedPass.txt ../Untitled.txt
-= [ Lepton's Crack ] =- Password Cracker [Apr 22 2012]
(C) Bernardo Reino (aka Lepton) <lepton@runbox.com>
and Miguel Dilaj (aka Nekromancer) <nekromancer@eudoramail.com>

./lcrack: method 'md4.c' not implemented, exiting..
usage: ./lcrack [-q | -v] -m <method> [<opts>] <file> ..
-o <file> : output password file
-d <file> : use word list from <file>
-t <file> : use pre-computed word list from <file>
-s <charset> : use specified charset for incremental
-s# <name> : use charset from charset.txt file
-l <lenset> : use specified length-set for incremental
-g <regex> : enumerate regex for incremental
-g# <name> : use regex from regex.txt file
-x<mode>[+|-] : activate/deactivate specified mode
mode = l : login mode
mode = f : fast word list mode
mode = s : smart word list mode
mode = b : incremental (brute-force) mode
-stdin : stdin (external) mode
-rand : randomized brute-force mode
-h : display usage information and exit
<method> : hash algorithm, one of:
{ 'dom' 'md4' 'md5' 'nt4' 'null' 'sha1' }

Then I tried to run it again:
$ ./lcrack -m -rand -xb+ -o ../CrackedPass.txt ../Untitled.txt
-= [ Lepton's Crack ] =- Password Cracker [Apr 22 2012]
(C) Bernardo Reino (aka Lepton) <lepton@runbox.com>
and Miguel Dilaj (aka Nekromancer) <nekromancer@eudoramail.com>

./lcrack: method '-rand' not implemented, exiting..
usage: ./lcrack [-q | -v] -m <method> [<opts>] <file> ..
-o <file> : output password file
-d <file> : use word list from <file>
-t <file> : use pre-computed word list from <file>
-s <charset> : use specified charset for incremental
-s# <name> : use charset from charset.txt file
-l <lenset> : use specified length-set for incremental
-g <regex> : enumerate regex for incremental
-g# <name> : use regex from regex.txt file
-x<mode>[+|-] : activate/deactivate specified mode
mode = l : login mode
mode = f : fast word list mode
mode = s : smart word list mode
mode = b : incremental (brute-force) mode
-stdin : stdin (external) mode
-rand : randomized brute-force mode
-h : display usage information and exit
<method> : hash algorithm, one of:
{ 'dom' 'md4' 'md5' 'nt4' 'null' 'sha1' }
tinkerC
New User
New User
 
Posts: 11
Joined: Wed Feb 11, 2009 3:53 pm
Blog: View Blog (0)


Re: recommended hash cracker for os x

Post by romeandolive on Fri Oct 26, 2012 3:55 pm
([msg=70437]see Re: recommended hash cracker for os x[/msg])

I was able to crack this hash using john the ripper. Followed this tutorial for installing:

http://www.youtube.com/watch?v=Erfm1Erck0U

I saved the hash on a txt file and loaded on john the ripper:

> ./john --format=raw-md4 yourfile
romeandolive
New User
New User
 
Posts: 1
Joined: Fri Oct 26, 2012 2:03 pm
Blog: View Blog (0)


Recommended hash cracker for Linux

Post by geraldo777 on Sat Nov 23, 2013 9:49 am
([msg=78281]see Recommended hash cracker for Linux[/msg])

John the Ripper seems the tool to go, the problem is that it has'nt the MD4 option in the free but only in the commercial pro version. Any other tools for Linux?
geraldo777
New User
New User
 
Posts: 1
Joined: Sat Nov 23, 2013 9:40 am
Blog: View Blog (0)


Re: Recommended hash cracker for Linux

Post by WallShadow on Sat Nov 23, 2013 8:38 pm
([msg=78283]see Re: Recommended hash cracker for Linux[/msg])

geraldo777 wrote:John the Ripper seems the tool to go, the problem is that it has'nt the MD4 option in the free but only in the commercial pro version. Any other tools for Linux?


although this thread is terribly old, this is never-the-less a valid question. you might wanna try hashcat (since that wasn't mentioned here yet). hashcat has a free version that is availible for download and usage on mac, and has a setting for cracking md4 among other things.
User avatar
WallShadow
Contributor
Contributor
 
Posts: 628
Joined: Tue Mar 06, 2012 9:37 pm
Blog: View Blog (0)


Previous

Return to (Real 5) Damn Telemarketers!

Who is online

Users browsing this forum: No registered users and 0 guests