#opvile returns! This was a special request and once you understand what is in store for tomorrow it will click for the need to discuss an old but still very important tool to add to your kit, password cracking, at least in this case understanding it and why it is important.
This information is for educational use. Why is password or in this case cracking hashes important? Well for a variety of reasons stemming from figuring out if your hashing method used on your database storing of your passwords is safe, or in a future case your wifi password is
secure. Which are all part of important opsec disciplines we should all be getting better with. The best tool to use for this is going to be hashcat, if you are unfamiliar with it, here is the link for hashcat: https://hashcat.net/hashcat/ 
It">https://hashcat.net/hashcat/&... is a wonderful, fast, and open source tool
You may also want to pick up the hashcat utils for the next installment, they are located here: https://github.com/hashcat/hashcat-utils">https://github.com/hashcat/h... and one last thing you may be interested in, which is the maskprocessor, which is great at generating wordlist(we will get to that). https://github.com/hashcat/maskprocessor/releases/">https://github.com/hashcat/m...
I would advise if you are to be doing any password cracking, hash cracking, or wpa injections, to use that good ole burner device we discussed on obtaining on day 1. Once you install hashcat, you may need to install build-essential if you are using linux via apt, yum, or other
package manager you are using. You will need gcc to build out all of the utils in the hashcat utils and if you choose to compile hashcat from source you will need it as well. Now let& #39;s get to doing some experiments with breaking some hashes and what is a word list. Now, there are
several ways to break a password, but usually it boils down to a dictionary attack(wordlist) and bruteforce methods(now mask methods are fastest). So how do we obtain said hashes to begin this process? Well this depends on what you are doing, I leave that for you to explore ;)
In this thread I will provide to you information that you can use to pursue your own journey into such cracking methods. A good resource to spot check a particular hash is to look at hashcat& #39;s examples here: https://hashcat.net/wiki/doku.php?id=example_hashes">https://hashcat.net/wiki/doku...
You may see $salt and $pass used this implies that along with the hash salt was added, depending on a number of factors salt can be easy to determine. For example, a company may use time of start of a session for a session id has along with it& #39;s md5 or sha of the session. When
you see pass it is referring to a password, this allows us to also use more dictionary attack method if for example they use a weak password. These are all various things to keep in mind when looking at hashed output and verifying that salt was added. Also note that contrary to
popular belief most companies practice poor practices on hash generation when using salt and password. So do not get discouraged if you are researching and hit a snag, just think about what you can derive data from and chances are you might stumble upon what you are looking for.
On to wordlists and how you may procure one, you can use the maskprocessor to generate them or you may find them from various online sites by looking up wordlists via duckduckgo. Wordlist can provide you with a lot of passwords used by most actual humans, and you can use the
maskprocessor with the ?a argument filling up a number of spaces, let& #39;s say 10-18 to generate those nifty auto created passwords browsers like to use. Just be sure to put the output to a file with -o argument and the name of an output file and let it run. This can be a very
rewarding experiment to check your password hashes from any databases you may run or from services that you may have found dumps from. Again this information is for your own educating of how this process works and I highly suggest experimenting and seeing just how dangerous a
weak passwords and hashing can be for you or a company. The next topic in this series will be about exploring bettercap, frame injections, hashcat, and WPA-PSK, so that we can secure our home networks. Proper opsec starts at home, not in the street. Stay vile and based. https://abs.twimg.com/emoji/v2/... draggable="false" alt="🧪" title="Test tube" aria-label="Emoji: Test tube">https://abs.twimg.com/emoji/v2/... draggable="false" alt="🖤" title="Black heart" aria-label="Emoji: Black heart">
You can follow @nixops.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: