Advanced CPU-based password recovery utility¶
- identify the hash first
- https://nth.skerritt.blog/
┌──(kali㉿kali)-[~/thm/LinuxPrivEsc] └─$ hashcat --show '$6$UK8svglsbusMD75r$we.iz9zkzbs21us7Quyg54amvz3yjcwtu8liq2vzx1/fs.krbvpnvwqw6t5rtr6udaxso7zt1kdsNjaoZmrwf1' Hash-mode was not specified with -m. Attempting to auto-detect hash mode. The following mode was auto-detected as the only one matching your input hash: 1800 | sha512crypt $6$, SHA512 (Unix) | Operating System NOTE: Auto-detect is best effort. The correct hash-mode is NOT guaranteed! Do NOT report auto-detect issues unless you are certain of the hash type.has
- https://nth.skerritt.blog/
- crack hash based on hash type and output to the terminal
hashcat -a 0 -m hash id# hash.txt /usr/share/wordlists/rockyou.txt
┌──(kali㉿kali)-[~/thm/LinuxPrivEsc]
└─$ hashcat -a 0 -m 1800 hash.txt /usr/share/wordlists/rockyou.txt --show
$6$Tb/euwmK$OXA.dwMeOAcopwBl68boTG5zi65wIHsc84OWAIye5VITLLtVlaXvRDJXET..it8r.jbrlpfZeMdwD3B0fGxJI0:password123