Skip to main content

Menu for cracking hashes.

Project description

This is meant to be a menu driver for crashing hashes.

Examples

# Manually add a hash if not specified on command line
hashcrack > add hash 2cf24dba5fb0a30e26e83b2ac5b9e29e1b161e5c1fa7425e73043362938b9824
# Be sure to set the type
hashcrack > set hashtype SHA2-256
# Optional -- tell hashcrack to use cpu if gpu is causing issues
hashcrack > set device cpu
# Crack it
hashcrack > crack
# If it's already cracked, show it
hashcrack > show

# Set your own wordlist (uses rockyou by default)
hashcrack > set wordlist <path_to_wordlist>

Cracking WPA2

hashcrack will attempt to determine the correct settings and extract the needed hashes for you. One example of this currently is pcaps. With hashcrack, it’s as simple as:

$ hashcrack ./my.pcap
   ▄█    █▄       ▄████████    ▄████████    ▄█    █▄     ▄████████    ▄████████    ▄████████  ▄████████    ▄█   ▄█▄
  ███    ███     ███    ███   ███    ███   ███    ███   ███    ███   ███    ███   ███    ███ ███    ███   ███ ▄███▀
  ███    ███     ███    ███   ███    █▀    ███    ███   ███    █▀    ███    ███   ███    ███ ███    █▀    ███▐██▀
 ▄███▄▄▄▄███▄▄   ███    ███   ███         ▄███▄▄▄▄███▄▄ ███         ▄███▄▄▄▄██▀   ███    ███ ███         ▄█████▀
▀▀███▀▀▀▀███▀  ▀███████████ ▀███████████ ▀▀███▀▀▀▀███▀  ███        ▀▀███▀▀▀▀▀   ▀███████████ ███        ▀▀█████▄
  ███    ███     ███    ███          ███   ███    ███   ███    █▄  ▀███████████   ███    ███ ███    █▄    ███▐██▄
  ███    ███     ███    ███    ▄█    ███   ███    ███   ███    ███   ███    ███   ███    ███ ███    ███   ███ ▀███▄
  ███    █▀      ███    █▀   ▄████████▀    ███    █▀    ████████▀    ███    ███   ███    █▀  ████████▀    ███   ▀█▀
Version 0.4 (https://github.com/bannsec/hashcrack)
Powered by: Hashcat (hashcat.net)

hashcrack > crack

Note

You may have to adjust the hashtype, though the default will work for most PSK setups.

Auto Configure

hashcrack will attempt to auto configure for certain types of input files. For instance, when trying to crack a WPA key, you must first extract that key from the pcap, then select the correct hash type in hashcat. hashcrack will do this type of configuration for you for various common file types.

# Auto crack wpa from a pcap
hashcrack --crack ./some.pcap

# Auto crack entries from a shadow file
hashcrack --crack ./shadow

# Auto crack an encrypted 7z file
hashcrack --crack ./file.7z

# Auto crack an encrypted rar file
hashcrack --crack ./file.rar

# Auto crack an encrypted zip file
hashcrack --crack ./file.zip

John Jumbo

John Jumbo is currently packed into this library (minus some of the processing scripts). The following commands are exported for use across Windows and Linux distros.

john, zip2john, rar2john, gpg2john, unafs, undrop, unshadow

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Files for hashcrack, version 0.9
Filename, size File type Python version Upload date Hashes
Filename, size hashcrack-0.9.tar.gz (49.4 MB) File type Source Python version None Upload date Hashes View hashes

Supported by

Elastic Elastic Search Pingdom Pingdom Monitoring Google Google BigQuery Sentry Sentry Error logging AWS AWS Cloud computing DataDog DataDog Monitoring Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page