Prompt
Our analysts have obtained password dumps storing hacker passwords. After obtaining a few plaintext passwords, it appears that they are based on Pokémon.
Walk-Through
The questions can be solved using hashcat with a wordlist of Pokémon.
hashcat hash.txt -m 0 -a 0 pokemon.txt
This command assumes that you have the hashes stored in a file called hash.txt
and that a plaintext list of Pokémon names was saved into a file called pokemon.txt
. The -m 0
option indicates a MD5 hash type and the -a 0
option indicates a dictionary attack.
MD5 hashing is case-sensitive since it operates on raw bytes. You may need to adjust the casing of your wordlist or use additional hashcat rules to brute force the casing.
Questions
a532443f3e04a9e00295a8cd2a75e080
54c10b9736b70e75c6e505f340b6e2f1
b8a24794813a47521b4be55747e0665a
83b020b0a7b3c353e1c11b1647b53cda
999cae1e22fe69d89d6f56e3050f18cb
©️ 2024 Cyber Skyline. All Rights Reserved. Unauthorized reproduction or distribution of this copyrighted work is illegal.