Hack$Notes
Search
⌃
K
Hack$Notes
Enumeration
Transferring Files
Metasploit Framework
Reverse Shells
Buffer Overflow
Spawning a Shell
Password Attacks
Passing the Hash
SAM/SYSTEM
Passwords
Hydra
Medusa
Ncrack
Unshadow
Hashcat
John The Ripper
fcrackzip
Privilege Escalation
Port Forwarding
Tools / Techniques
Resources
Powered By
GitBook
Passwords
Passwords
Recognize the passwords used.
if the hash starts by $1$, MD5 is used;
if the hash starts by $2$ or $2a$, Blowfish is used;
if the hash starts by $5$, SHA-256 is used;
if the hash starts by $6$, SHA-512 is used.
Search for Hashes under kali.
hashcat --example-hashes
Previous
SAM/SYSTEM
Next
Hydra
Last modified
3yr ago