HashCracker is Python program used to crack unknown hashes. Place a list of random hashes in any order that use the MD5, SHA-1, or SHA-256 algorithms. All libraries used are a part of the standard library in Python. How to Install and Run. HashCracker is a python hash cracker which support hashing algorithms like SHA512, SHA256, SHA384, SHA1, MD5, SHA224. HashCracker is a python hash cracker which support hashing algorithms like SHA512, SHA256, SHA384, SHA1, MD5, SHA224.
How To Crack WPA/WPA2 With HashCat
The tutorial will illustrate how to install and configure HashCat on a Windows client and crack the captured PMKID or .hccap files using a wordlist dictionary attack.
“Hashcat is the self-proclaimed world’s fastest password recovery tool. It had a proprietary code base until 2015, but is now released as free software. Versions are available for Linux, OS X, and Windows and can come in CPU-based or GPU-based variants.”
The WPA2 handshake can be captured on a Linux compatible client like Kali Linux with a supported WiFi card running on VirtualBox. Then converted to the right format depending on the captured method and moved over to the Windows client to be cracked.
Use the guides Capturing WPA2 and Capturing WPA2 PMKID to capture the WPA2 handshake. For this test we will use the famous “Rockyou” wordlist.
DISCLAIMER: This software/tutorial is for educational purposes only. It should not be used for illegal activity. The author is not responsible for its use or the users action.
Step 1: Download HashCat
Hashcat do not require any installation, it is a portable program it requires you to unpack the downloaded archive.
- First you need to download Hashcat binaries from https://hashcat.net/hashcat/
- Navigate to the location where you saved the downloaded file, and unzip the file
Step 2: Download Wordlist
They are numerous wordlists out on the web, for this test we are going to use the famous “rockyou”.
- Open the hashcat folder on your harddrive and create a new folder called “wordlist”
- Download therockyou.txt wordlist from this Link.
- Save the downloaded file in the new folder“wordlist”
Step 3: Prepare Your Captured WPA2 Handshake
Depending on the method you used to capture the handshake you either must format the cap file to 2500 hash-mode or the PMKID file to hashcat 16800 hash-mode .
For how to format the files please see the guides Capturing WPA2 and Capturing WPA2 PMKID.
In this lab we are using a captured PMKID and a pcpa handshake formatted to hashcat readable format. “HonnyP01.hccapx ” and ” HonnyP02.16800″.
I’m using two different home routers from D-Link and Technicolor for this experiment, both WiFi routers are owed by me.
- The “HonnyP01.hccapx” file is captured from the D-Link router.
- The ” HonnyP02.16800″ file is captured from the Technicolor router.
Step 4: Start Hashcat
You need to run hashcat in CMD or PowerShell. In this example we will use CMD to execute our commands and crack the handshake.
Open CMD and navigate to the hashcat folder.
Type hashcat64 -h to display all options
Step 5: Crack WPA2
In the First example we will illustrate how to get the password from a converted pcap file “.hccapx”.
Copy your converted file to the hashcat folder, in this example i am copying the file HonnyP01.hccapx to my hashcat folder.
Next we will start hashcat and use the wordlist rockyou, type in the parameters below in CMD.
- hashcat64 the binary
- -m 2500 the format type
- -w 3 workload-profile 3
- HonnyP01.hccapx the formatted file
- “wordlistrockyou.txt” the path to the wordlist
Hashcat will start processing the file, if you are successful the terminal will display the hash and the password.
Here we can see that hashcat was able to match the hash to a password in the wordlist, in this lab the password to the D-Link WiFi is “password”. You can chose to let the application run trough the wordlist or press “q” to quit.
You can display the cracked password with the “show” command or by running the same command again, all cracked hashes will be stored in the “hashcat.potfile” in the hashcat folder.
To display the cracked password in CDM type the command bellow.
In the next example we will run the same command except now we use the 16800 mode to run the dictionary attack against formatted PMKID file captured from the Technicolor router.
Hashtag Decoder
- hashcat64 the binary
- -m 16800 the format type
- -w 3 workload-profile 3
- HonnyP02.16800 the formatted file
- “wordlistrockyou.txt” the path to the wordlist
Here we can see that the cracked password is “adsladsl” for the Technicolor router.
Extra: Brute Force Attack And Rule based attack
You can let hashcat brute force the file with the command bellow.
Or use ruled base attack.
Conclusion
Your home or office WiFi can be hacked if you are using a weak password, as always a strong and complex password is still the best defense against an attacker.
DISCLAIMER: This software/tutorial is for educational purposes only. It should not be used for illegal activity. The author is not responsible for its use or the users action.
Hashstack™ is the ultimate password cracking software stack, designed and developed by the world's top password crackers for true password cracking professionals, and exclusively available on Terahash® turn-key password cracking appliances.
Optimized Workflow
Hash Cracker Download
Modeled after Team Hashcat's own workflows, Hashstack™ works the way you work and is designed with team collaboration at the forefront. Hashstack™ is project-centric and list-centric rather than job-centric, which means that hash lists are logically organized by case/engagement. You may then add collaborators to each hash list, optionally organized into groups/teams, so that multiple simultaneous users may work together against multiple simultaneous hash lists. And Hashstack's™ advanced, multi-dimensional queueing mechanism and job scheduler ensures that all resources are fairly shared across the cluster, with the option to assign job priorities and resource limits. So whether you work in law enforcement, military/defense, information security, security consulting, digital forensics, or litigation support, Hashstack™ provides the perfect environment for collaborative, multi-user password cracking!
Extreme Performance
Unlike other software which only supports GPU acceleration for a small subset of available hash formats, Hashstack™ has full GPU acceleration for ALL 375+ highly-optimized hash formats. Coupled with Terahash's® finely-tuned appliances which deliver up to 35% more performance over other solutions using similar hardware, Hashstack™ offers unparalleled hash cracking performance. And unlike other software that allows you to queue up a batch of multiple hashes/files but then works on them in serial – exahusting all attacks on one file before moving on to the next – Hashstack™ works on multiple hashes in parallel, and on multiple jobs in parallel too, enabling you to find the most passwords in the least amount of time.
Infinitely Scalablity
One Terahash® appliance is great – 20 Terahash® appliances are better! Password cracking has exponential complexity, so there's literally no such thing as having 'too many' cracking resources. But password cracking is also an embarassingly parallel problem, and thus Hashstack™ was designed to be infinitely scalable – you can purchase and stack as many appliances as your budget permits, and Hashstack™ will fully utilize all of them for distributing password cracking jobs. Contrary to popular belief, the biggest advantage to operating a cluster of multiple Terahash® appliances is actually not the ability to utilize the raw compute power of all resources combined, but rather the ability to run many simultaneous jobs in parallel. Posting up 12 TH/s on NTLM is certainly impressive, but the ability to run 200 jobs in parallel is far more impressive and far more practical!
Salted Hash Cracker
High Fault Tolerance
Online Hash Cracker
Hashstack™ is highly tolerant of failures, so having an appliance go down for any reason does not mean the jobs currently running will fail; Hashstack™ will simply route around the failure until the issue can be resolved. This resilience also enables you to add appliances on-the-fly as well: simply rack up a new appliance, and it will automatically join the cluster and begin work on the active jobs in the queue!