Rockyou

Prompt

Our analysts have obtained password dumps storing hacker passwords. After obtaining a few plaintext passwords, it appears that they overlap with the passwords from the Rockyou breach.

Walk-Through

These passwords can be cracked using hashcat with the Rockyou wordlist (this comes included by default in Kali Linux in the /usr/share/wordlists directory).

🚧

If this is your first time using Kali Linux to crack passwords, the rockyou.txt file will be compressed as a tar.gz file. The file cannot be read (or used by hashcat) until it is decompressed.

Run the following command to decompress the rockyou.txt.gz file:

tar -xvzf /usr/share/wordlists/rockyou.txt.gz

-x : extracts all files

-v: enables verbose output to see the files be extracted

-z: decompress using gzip

-f: specify the filename of the archive

Guide

First, add all of the hashes for this challenge to a text document and save it as hash.txt.

✍🏼

Place each hash on its own line with no leading or trailing spaces.

image

Next, let’s use hashcat , hashid , and an online hash analyzer to identify the types of hashes we were given. Repeat this process for each hash.

image
The number given at the left indicates the “hash mode” you can use to crack the password with
The number given at the left indicates the “hash mode” you can use to crack the password with hashcat. A reference page for these modes is linked below in resources.
https://hashes.com/en/tools/hash_identifier
https://www.tunnelsup.com/hash-analyzer/

A variety of tools can be useful to identify hash types. All four of the tools used indicated this first hash is possibly an MD5 hash. Lets try using hashcat with the MD5 hash-mode. Use the output of the hashcat command above, or the hashcat example hashes website, to find the hash-mode.

Solution

Use this command to crack the hashes:

hashcat hash.txt -m 0 -a 0 /usr/share/wordlists/rockyou.txt

hash.txt : the file location + file name that has the hashes hashcat will try to crack

-m 0 : uses hash-mode 0 — indicates the hashes are MD5 hashes

-a 0 : use a dictionary attack (this requires a wordlist to be specified)

/usr/share/wordlists/rockyou.txt : the file location +name of the wordlist

Partial output of successful recovery shown. The cracked hashes have been redacted. Notice that the first hash cracked by
Partial output of successful recovery shown. The cracked hashes have been redacted. Notice that the first hash cracked by hashcat is for the third question given.
🚧

hashcat does not preserve the original hash order. Always verify each cracked hash matches the correct question before submitting!

Tutorial Video

Watch our full Tutorial Video to learn more about hashed passwords, salted hashes and password cracking AND to see a walkthrough of how to solve this challenge:

Questions

68a96446a5afb4ab69a2d15091771e39

ec5f0b1826389df8622133014e88afde

32e5f63b189b78dccf0b97ac41f0d228

2233287f476ba63323e60addca1f6b64

6539bbb84fe2de2628fc5e4f2a31f23a

©️ 2026 Cyber Skyline. All Rights Reserved. Unauthorized reproduction or distribution of this copyrighted work is illegal.