3. Hash-cracking

Cracking Methodology:

  1. Extract hashes
  2. Format hashes
  3. Calculate the cracking time
  4. Prepare wordlist
  5. Attack the hash

Rule-based Attacks:

\$<valfritt> = appendar valfritt
\^<valfritt> = prependar valfritt
c = stor första bokstav
hashcat -r regel.rule --stdout lista.txt

Hashcat-crack commando:

hashcat -m 0 hash.txt /usr/share/wordlists/rockyou.txt -r regel.rule --force

Grep Hashcat Hash Type ID:

hashcat --help | grep -i "<sökning>"


Keyspace = Characters Possible x Password Length

Crack Time = Keyspace / Hash Rate