In previous articles, I've already told you about John The Ripper software to make dictionary attacks from a hash to find the corresponding password.
Today we will see a tool that will help you make the maneuver more quickly by finding what type of hash is used for a password.
You should know that passwords are never written in clear in a database, they are coded with a hash function. There are several: MD5, SHA256, NTLM, etc.
To target research directly password on a specific type of hash, we will use the Python script HashTag. It will recognize the fingerprint of a hash to denote its kind: MD5, SHA, etc.
Sometimes HashTag not find exactly the type used, but will give an opportunity to the panel. That is enough to save time and eliminate a hundred functions.
How to use Hashtag.py?
Before you start, you will have to install the Python language on your machine. Prefer version 2.7 and do not change the default installation directory. Then download HashTag.py. At the bottom of the page, right-click the link and then Save target as. Then place it in the C: \ Python27.
With all that, you're ready! Make Shift + right click on the C: \ Python27 and select Open Command Window Here. You will have to type python hashtag.py -sh [your hash].
When you know what kind of hash you have to do, you'll win a lot more time with John the Ripper! For example, when you are sure it is a MD5 must be pressed john -format: raw-md5 hash.txt or John -format: raw-sha512 hash.txt if it is a SHA-512. Knowing or watching, it took only 16 seconds to find John the Ripper password azerty while it would be many minutes trying all types of hash. If HashTag gives you several possible types of hash, it will try them one by one.
Remember that the best support for this blog is to love and share our articles!
For more news, thank you for subscribe to the blog newsletter to its RSS feed. Please also have a look at Twitter, Google+ or Facebook for other news.
ConversionConversion EmoticonEmoticon