Situatie
In today’s digital world, passwords are the first line of defense against cyber threats—but are they really secure? This tutorial takes a fun and hands-on approach to hash cracking, helping you understand how attackers break weak passwords and how you can protect yourself.
Solutie
Steps:
1)Generate a Hashed Password:
echo -n “NotMyPassword0k?” | sha256sum
This outputs a SHA-256 hash.
466b2859a33ae4019732204e04413b0975f6083bab9220aa29086a62cccd658b
2)Save the Hash for Cracking:
echo “466b2859a33ae4019732204e04413b0975f6083bab9220aa29086a62cccd658b” > hash.txt
3)Crack It Using a Wordlist (RockYou!):
john –wordlist=/usr/share/wordlists/rockyou.txt –format=raw-sha256 hash.txt
If the password is in the wordlist, John will crack it!
Challenge: Try hashing a more complex password and see how long it takes to crack. Experiment with different hashing algorithms like MD5 or bcrypt.
Leave A Comment?