Day 23
You wanna know what happens to your hashes?
Last updated
Was this helpful?
You wanna know what happens to your hashes?
Last updated
Was this helpful?
Welcome to Day 23 of Advent of Cyber 2024
In today’s challenge, we’ll be cracking hashes. Let’s get started!
Hashing is a process in computer science and cryptography used to transform data (usually text, like a password) into a fixed-length string of characters that represents the original data. This transformation is done by a mathematical algorithm called a hash function. The output of this process is called a hash.
Lets Begin:
Start the machine and wait for it to deploy
Once deployed Locate the Hash:
The hash is stored in the /home/user/AOC2024/hash1.txt
file.
The hash should display as:
956a72c83a895cb767bb5be8dba791395021dcece002b689cf3b5bf5aaa20ac
Now, to find the type of hash use hash-identifier
and paste the hashvalue
or
use python hash-id.py
From the output It identifies as: SHA-256
Lets try to crack the hash using rockyou.txt
:
Unfortunately, no password was found
Lets try adding the option --rules=wordlist
to john
- this generates multiple passwords from each one. For instance, it appends and prepends single digits. It does various common substitutions; for example, a
can be replaced with @
, i
can be replaced with !
, and s
can be replaced with $
Success! we found the password.
Next , lets Crack the PDF Password:
The first thing we need to do is to convert the password-protected file into a format that john
can attack. Luckily, John the Ripper jumbo edition comes with the necessary tools. The different tools follow the naming style “format2john”.
Lets list all tools using : ls /opt/john/2john
From the output, we see two tools that are interesting one written in python and the other in perl from this pdf2john.pl
should do the job perfectl
Convert the pdf to hash : pdf2john.pl private.pdf > pdf.hash
Create a Custom Wordlist: The Mayor’s password hints involve personal references. Use a custom wordlist with terms like:
Save this as wordlist.txt
Now run john --rules=single --wordlist=wordlist.txt pdf.hash
We found the passoword for the pdf :
Now lets open the pdf and find the flag
To read it, lets use a pdf to text tool:
pdftotext private.pdf -upw M4y0rM41w4r3
and use head
command to read the top portion of the file.
Thats it we found the flag!!
1.Crack the hash value stored in hash1.txt
. What was the password?
A: fluffycat12
2.What is the flag at the top of the private.pdf
file?
A: THM{do_not_GET_CAUGHT}
Stay tuned for Day 24 and Happy Hacking 🎄
Thank you!