Skip to content

Advanced CPU-based password recovery utility

  • identify the hash first
    • https://nth.skerritt.blog/
      ┌──(kali㉿kali)-[~/thm/LinuxPrivEsc]
      └─$ hashcat --show '$6$UK8svglsbusMD75r$we.iz9zkzbs21us7Quyg54amvz3yjcwtu8liq2vzx1/fs.krbvpnvwqw6t5rtr6udaxso7zt1kdsNjaoZmrwf1'
      Hash-mode was not specified with -m. Attempting to auto-detect hash mode.
      The following mode was auto-detected as the only one matching your input hash:
      
      1800 | sha512crypt $6$, SHA512 (Unix) | Operating System
      
      NOTE: Auto-detect is best effort. The correct hash-mode is NOT guaranteed!
      Do NOT report auto-detect issues unless you are certain of the hash type.has
      

- crack hash based on hash type and output to the terminal  hashcat -a 0 -m hash id# hash.txt /usr/share/wordlists/rockyou.txt

┌──(kali㉿kali)-[~/thm/LinuxPrivEsc]
└─$ hashcat -a 0 -m 1800 hash.txt /usr/share/wordlists/rockyou.txt --show
$6$Tb/euwmK$OXA.dwMeOAcopwBl68boTG5zi65wIHsc84OWAIye5VITLLtVlaXvRDJXET..it8r.jbrlpfZeMdwD3B0fGxJI0:password123