Password Cracking Using Hashcat
Errors on Hashcat
If you are running Hashcat on AMD based GPU like me you might get errors about AMD HIP SDK.
For this, we can install AMD HIP SDK
Also, Hashcat Beta works well with this --> https://hashcat.net/beta/
For fast lookup I have added the most commonly seen ones in AD environments below
Mode | Hash | Description |
---|---|---|
1000 | NTLM | Extremely common, used for general domain authentication |
1100 | MsCache | Domain cached credentials, old version |
2100 | MsCache v2 | Domain cached credentials, new version |
3000 | LM | Old, rarely used anymore (still a part of NTLM) |
5500 | NetNTLMv1 / NetNTLMv1+ESS | NTLM for authentication over the network |
5600 | NetNTLMv2 | NTLM for authentication over the network |
7500 | Kerberos 5 AS-REQ Pre-Auth etype 23 | AS_REQ is the initial user authentication request of Kerberoas |
13100 | Kerberos 5 TGS-REP etype 23 | TGS_REP is the reply of the Ticket Granting Server to the previous request |
Dictionary attack
Here is a very basic dictionary attack using the world famous rockyou wordlist.
The limitation here is as with all wordlist attacks the fact that if the password you are trying to crack is not in the list; you won't be able to crack it. This leads us to the next type of attack, a rule-based attack.
Rules-based attack
Run rockyou Wordlist with the OneRuletoRuleThemAllStill ruleset.
You are free to experiment with both lists and rules in this part. Only the sky is the limit (or your GPU / tolerance for hot computer smell)
Last updated