Hashes are generated by one-way mathematical algorithms, which means they cannot be reversed. The only way to break them is through brute force. In this chapter, we will talk about different ways in which we can crack a password hash obtained during a pentest activity performed on a web app/network, among others.
In this chapter, we will cover the following recipes:
- Identifying different types of hashes in the wild
- Hash-identifier to the rescue
- Cracking with Patator
- Playing with John the Ripper
- Johnny Bravo!
- Using ceWL
- Generating wordlists with crunch
- Using Pipal