DEV Community

Cover image for Word lists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.
ANDGOEDU
ANDGOEDU

Posted on • Edited on

Word lists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.

๐Ÿ” Overview Of Wordlists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.๐Ÿ”

Common Password Formats

Understanding password security is crucial, considering different encryption methods for a password like "R@nT4g*Ne!":

  • SHA-1:

    • Output: 12bf203295c014c580302f4fae101817ec085949
    • Characteristics: 40 characters, no clear decryption method.
  • SHA-1 with Salt:

    • Output: bc6b79c7716722cb383321e40f31734bce0c3598
    • Characteristics: 40 characters, with the addition of the word "Free."
  • MD5:

    • Output: 4e84f7e8ce5ba8cdfe99d4ff41dc2d41
    • Characteristics: Encoded into a 128-bit string.
  • AES (Advanced Encryption Standard):

    • Characteristics: Utilizes a symmetric encryption algorithm with a variable bit length.

-- Encryption Algorithms

  • SHA-1-512 (-1-512) Stands for the buffer size when that increases the level of encryption is higher.

-- One Way Hash - Designed for cryptography

  • MD5 and MD4 example (Not Recommended to be Used Vulnerable).

Lets Checkout some commands basics.

Commands Basics

This command is used to generate an actual

echo -n "adminpassword" | sha1sum
Enter fullscreen mode Exit fullscreen mode

Result :

bash efacc4001e857f7eba4ae781c2932dedf843865e

  • HashID is used to determine the type of hash

  • Create a new file called new.hash

touch new.hash
Enter fullscreen mode Exit fullscreen mode
  • Use the nano text editor the copy the result above or create your own.
nano new.hash
Enter fullscreen mode Exit fullscreen mode
  • Note : Inside nano to save the file press CTRL + X and then Y then ENTER To save the file .

  • Now use hashid to determine what hash type this file is using

hashid -m new.hash
Enter fullscreen mode Exit fullscreen mode
  1. Crunch The Command Used here Creates lists with every possible combination of number, you can also use crunch with uppercase and lowercase letters , special characters.
Syntax
Usage: crunch <min> <max> [options]

โ”Œโ”€โ”€(rootใ‰ฟkali)-[~]
โ””โ”€# crunch 1 3 0123456789 -O /home/kali/Desktop/phonepassword.txt 

Enter fullscreen mode Exit fullscreen mode
  • Optional Commands for testing
  • Its Optional (Requires alot of PC Resources).
โ”Œโ”€โ”€(rootใ‰ฟkali)-[~]
โ””โ”€# crunch 3 10 0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ 
Enter fullscreen mode Exit fullscreen mode
  • Optional - Add generated list to already existing file like rockyou.txt
โ”Œโ”€โ”€(rootใ‰ฟkali)-[~]
โ””โ”€# crunch 1 3 0123456789 >> /usr/share/wordlists/rockyou.txt

Enter fullscreen mode Exit fullscreen mode

1. Wordlists

Simply used to generate rockyou.txt and show Word List Files on Kali.

โ”Œโ”€โ”€(rootใ‰ฟkali)-[~]
โ””โ”€# wordlists 

Enter fullscreen mode Exit fullscreen mode

Result

/usr/share/wordlists
โ”œโ”€โ”€ amass - /usr/share/amass/wordlists
โ”œโ”€โ”€ dirb - /usr/share/dirb/wordlists
โ”œโ”€โ”€ dirbuster - /usr/share/dirbuster/wordlists
โ”œโ”€โ”€ fasttrack.txt - /usr/share/set/src/fasttrack/wordlist.txt
โ”œโ”€โ”€ fern-wifi - /usr/share/fern-wifi-cracker/extras/wordlists
โ”œโ”€โ”€ john.lst - /usr/share/john/password.lst
โ”œโ”€โ”€ legion - /usr/share/legion/wordlists
โ”œโ”€โ”€ metasploit - /usr/share/metasploit-framework/data/wordlists
โ”œโ”€โ”€ nmap.lst - /usr/share/nmap/nselib/data/passwords.lst
โ”œโ”€โ”€ rockyou.txt
โ”œโ”€โ”€ rockyou.txt.gz
โ”œโ”€โ”€ sqlmap.txt - /usr/share/sqlmap/data/txt/wordlist.txt
โ”œโ”€โ”€ wfuzz - /usr/share/wfuzz/wordlist
โ””โ”€โ”€ wifite.txt - /usr/share/dict/wordlist-probable.txt

Enter fullscreen mode Exit fullscreen mode
โ”Œโ”€โ”€(rootใ‰ฟkali)-[~]
โ””โ”€# cd /usr/share/wordlists // cd into wordlists directory 
โ”Œโ”€โ”€(rootใ‰ฟkali)-[~]
โ””โ”€# ls -la // list all directory items
โ”Œโ”€โ”€(rootใ‰ฟkali)-[~]
โ””โ”€# gunzip /usr/share/wordlists/rockyou.txt.gz //extracts rockyou.txt if not extracted already
Enter fullscreen mode Exit fullscreen mode

2. John The Ripper

Always check the -h or --help option for any tool used on kali to check the syntax and options.

  • Review Options </>
โ”Œโ”€โ”€(rootใ‰ฟkali)-[~]
โ””โ”€#john --help
Enter fullscreen mode Exit fullscreen mode
  • Check File Formats John Can Crack. </>
โ”Œโ”€โ”€(rootใ‰ฟkali)-[~]
โ””โ”€# john --list=formats // formats and protocols that can be used with john
Enter fullscreen mode Exit fullscreen mode
โ”Œโ”€โ”€(rootใ‰ฟkali)-[~]
โ””โ”€#john --wordlist=/usr/share/wordlists/rockyou.txt --format=Raw-SHA1 --fork2 SHA1.txt
Enter fullscreen mode Exit fullscreen mode
โ”Œโ”€โ”€(rootใ‰ฟkali)-[~]
โ””โ”€#john --show --format=Raw-SHA1 SHA1.txt
Enter fullscreen mode Exit fullscreen mode

The Same commands apply for SHA224, SHA256, MD5, MD4 for example and the check the formats that john support with the command provided in the above.

3. HashCat - Advanced Password Cracker

  • Utilizes markov statistical theory A russian scientist - with AI.๐Ÿค–
  • Check PassGAN

๐Ÿ”‘ Core Attack Modes ๐Ÿ”‘

  • Dictionary Attack - Tries all words in a list, also known as "straight" mode. (Attack mode 0, -a 0)
  • Combinator Attack - Concatenates words from multiple wordlists. (-a 1)
  • Brute-force Attack and Mask Attack - Tries all characters from given charsets, per position. (-a 3)
  • Hybrid Attack - Combines wordlists with masks (-a 6) and masks with wordlists (-a 7); can also be done with rules.
  • Association Attack - Uses additional information like a username, filename, or hint to attack a specific hash. (-a 9)

Read more about Markov Chains.

hashcat --help
hashcat -m 100 new.hash rockyou.txt
Enter fullscreen mode Exit fullscreen mode

4. MSF/WordLists

Check MetaSploit WordLists

ls -lh /usr/share/metasploit-framework/data/wordlists/

Enter fullscreen mode Exit fullscreen mode

Common Password Formats

Understanding password security is very important, with various tools transforming passwords in distinct ways. Let's consider the password "R@nT4g*Ne!" (Rent Forgone, in common terms) and observe its transformation through different encryption methods:

SHA-1:

Output: 12bf203295c014c580302f4fae101817ec085949
Characteristics: 40 characters, no clear decryption method.
SHA-1 with Salt:

Output: bc6b79c7716722cb383321e40f31734bce0c3598
Characteristics: Still 40 characters, with the addition of the word "Free."
MD5:

Output: 4e84f7e8ce5ba8cdfe99d4ff41dc2d41
Characteristics: Encoded into a 128-bit string.
AES (Advanced Encryption Standard):

Characteristics: Utilizes a symmetric encryption algorithm with variable bit length.
Note: The outcome of AES encryption is highly variable, depending on factors like bit length, making it nearly impossible to predict the final password representation.
In summary, these encryption methods offer different levels of security and characteristics, with varying degrees of complexity and resistance to decryption.

References

๐Ÿ”—Kali Linux Wordlist: What you need to know
๐Ÿ”—crunch
๐Ÿ”—WordLists - Kali-Tools
๐Ÿ”—WordLists - GitLab - repository
๐Ÿ”—John - Kali-Tools .
๐Ÿ”—Openwall -github repository -John
๐Ÿ”—John-The-Ripper-Tutorial - Techy Rick
๐Ÿ”—Openwall -John - Offical Website .
๐Ÿ”—Hash Cat - Wiki
๐Ÿ”—Cap 2 Hashcat
๐Ÿ”—Markov - Chain
๐Ÿ”—Hash Cat - Forums
๐Ÿ”—Security Stack Exchange - Question 260773
๐Ÿ”—StationX - How to use Hashcat
๐Ÿ”—MSF/Wordlists - charlesreid
๐Ÿ”—MSFConsole
๐Ÿ”—How to use hashcat
๐Ÿ”—MSF/Wordlists - charlesreid1
๐Ÿ”—Where do the words in /usr/share/dict/words come from?
๐Ÿ”—SCOWL (Spell Checker Oriented Word Lists)
๐Ÿ”—The spell utility -spell - find spelling errors (LEGACY) - UNIX
What are Different Types of Cryptography?
sha1-vs-sha2-the-technical-difference-explained-by-ssl-experts/
๐Ÿ”—password-encryption
๐Ÿ”—Secure-Programs
SHA-1
๐Ÿ”—What-are-computer-algorithms
๐Ÿ”—What Are MD5, SHA-1, and SHA-256 Hashes, and How Do I Check Them? - howtogeek.com
๐Ÿ”—kali-linux-wordlist-what-you-need-to-know

Johnny
Openwall -info wiki -Johnny
Openwall -github repository -Johnny

Top comments (0)