Mask

Prompt

Our analysts have obtained password dumps storing hacker passwords. After obtaining a few plaintext passwords, it appears that they are all in the format: "SKY-HQNT-" followed by 4 digits. Can you crack them?

Tutorial Video

Walk-Through

These passwords can be cracked using hashcat with a mask of SKY-HQNT-?d?d?d?d

hashcat -m 0 -a 3 ./hash.txt 'SKY-HQNT-?d?d?d?d'

This command assumes that you have the hashes stored in a file called hash.txt. The -m 0 option indicates a MD5 hash type and the -a 3 option indicates a brute-force/mask attack. The ?d in the hash indicates the hashcat should attempt passwords with a different digit in the place of each ?d. This would mean that hashcat will attempt all possible passwords from SKY-HQNT-0000 to SKY-HQNT-9999.

Questions

71b816fe0b7b763d889ecc227eab400a

674291170dffcf620bda2a604a6820ea

06f03267f31077d2c4b5c728472070ae

d866f4b3b34b598375149fb7661113ab

d9053951a8d1c15254b46ec9fc974a6b

©️ 2024 Cyber Skyline. All Rights Reserved. Unauthorized reproduction or distribution of this copyrighted work is illegal.