Monday, 21 May 2012

findmyhash : Crack the hash on Backtrack 5


                            findmyhash 

Learn how to crack hashes on Backtrack 5

findmyhash

Introduction 
  • findmyhash is a python script which is used to crack the hashes .
  • With findmyhash tool you can crack different types of hashes using free online services.
  • Make sure you are connecting to a internet before using findmyhash tool.

How to open findmyhash 
  • BackTrack > Priviledge Escalation > Password Attacks > Online Attacks > findmyhash

How to open findmyhash

  • findmyhash is open now .

findmyhash  Backtrack 5


Syntax  
  • Syntax : ./findmyhash.py <algorithm> OPTIONS
  • ./findmyhash.py is used to start the tool.
  • <algorithm> :  type of algorithm used here  like - MD5,SHA1,JUNIPER etc .
  • OPTIONS : like -h ,-f,-g etc .
  • See the image below for more details of syntax -


Algorithm 
  • Different types of algorithm are used in findmyhash tool
  • See the image below  for different algorithms-

Options
  • These are the valid options you can use in findmyhash are shown in the below image -
  • -h  <hash_values> : This option used when we want to crack one hash .
  • -f  <file> : It is used when we want to crack several hashes.
  • -g : It is used when we have to search in a google .
  • See the image below - 


How to use findmyhash 

Example 1: Cracking MD4 hash 
  • Example 1 : Cracking the MD4 hash by findmyhash tool.
  • know more about MD4 : Click here - http://www.ietf.org/rfc/rfc1320.txt
  • See the image below for more details - 
  • See the below image shows the output string is test .

Example 2 : Cracking the MD5 hash 
  • MD5 is known as Message-Digest Algorithm (MD5).
  • In this example 1 i am going to crack the MD5 hash by a findmyhash tool . 
  • Click here to know more about MD5 :-  http://www.ietf.org/rfc/rfc1321.txt
  • See the image below -
  • HASH CRACKED !!!  the string is hackingDNA 



EXAMPLE 3 : Cracking the SHA1 hash


  • SHA-1 is known as Secure Hash Algorithm 1.
  • SHA- 1 is currently a secure cryptographic hash function .
  • SHA-1 is designed by the NSA.
  • Also I have define two ways to use commands in findmyhash tool . 
  • See the image for more details -



  • Another SHA-1 Example 





EXAMPLE 4: - Cracking SHA-256 hash 


  • SHA-256 is known as Secure Hash Algorithm.
  • SHA -256 is a 256 bit message digest Algorithm.
  • See the image below -



EXAMPLE  5:- Cracking the JUNIPER hash

  • In this example ,Juniper hash is cracked .
  • All the hashes are cracked online .

  • Another example of Juniper 


 EXAMPLE 6 :  Cracking the RIPEMD-160 hash

  • RIPEMD-160 (RACE Integrity Primitives Evaluation Message Digest) is a 160-bit message digest algorithm.
  • Below image shows the example of RIPEMD-160 -


EXAMPLE 7 : Cracking LM Hash
  • LM is known as Lan Manager Hash .
  • LM is used in windows to store the user passwords.
  • See the below image -

  • Another Example 

EXAMPLE 8 : Cracking the CISCO IOS 7 hash

  • See the image below -
CISCO IOS 7





  • This is how we can use this tool to crack the hashes online .
  • If you like this article then , don't forget to drop a comment .
  • Soon more examples will be added in this articles .
  • You can also join us on facebook 
  • Facebook link :    https://www.facebook.com/hackingDNA
THIS ARTICLE IS JUST FOR EDUCATIONAL PURPOSE ONLY /- 
                                   THANK YOU FOR READING THIS ARTICLE 

0 comments:

Categories

Angry IPScanner On Backtrack 4 Arduino Arduino Opensource community attacks on router auditing tool Aurora Exploiting Through Kali Linux AUTOSCAN ON BACKTRACK 5 BackBox Linux On hackingDNA Backtrack 5 : Linux Commands Backtrack Bootable Pendrive Backtrack Tool : The Harvester Blender On Backtrack 5 Block Command Prompt Browser Autopwn On Backtrack 5 BUGTRAQ LOG REMOVER BLEACHBIT chkrootkit on Backtrack 5 chntpw on backtrack 5 cisco switches routing auditing tool. Client Side Attack On Backtrack 5 Command Shell Upgrade On Backtrack 5 Conky On Backtrack 5 convert guest account into admin using chntpw in backtrack 5 Convert Jpg Image into Ascii on Backtrack 5 countermeasures Cracking Unix Password On Backtrack 5 Cupp On Backtrack 5 Cutycapt On Kali Linux Detect Sniffer6 On Kali Linux dmitry on backtrack 5 Dnmap On Kali Linux dnsenum on backtrack 5 dnsrecon on backtrack 5 dnstracer on backtrack 5 dnswalk on backtrack 5 DOMAIN TOOL ON BUGTRAQ Dos attack driftnet on backtrack 5 dsniff on backtrack 5 enum4linux esp8266 EtherApe On BackTrack 5 ewizard on backtrack 5 ExifTool On BackTrack 5 Exploit Distccd On BackTrack 5 Exploit RDP Vulnerability On Kali Linux Exploit Samba Server On Backtrack 5 fatback on backtrack 5 FERN CRACKER ON BACKTRACK 5 Fierce in Backtrack 5 findmyhash : Crack the hash on Backtrack 5 Firewalk-Script On BackTrack 5 Firewall On Backtrack 5 Flash Player On Backtrack 5 Genlist On Backtrack 5 Gerix Cracker On Backtrack 5 Get Your Data Back Golismero On BackTrack 5 GOOFILE ON BUGTRAQ Google Kung-Fu goohost on backtrack 5 Grendel-Scan On Backtrack 5 gtk-recordmydesktop on backtrack 5 HACK BACKTRACK 5 via RAT Hack The Database with Backtrack 5 Hack the Facebook with Backtrack 5 Hack the windows in GNS3 Hack Windows XP using Backtrack 5 Hack Windows Xp using msfconsole hacking Hacking Lab 01 Hacking Windows 7 USING Backtrack 5 hackingdna hackingDNA choice :Best Antivirus Detection honeyd on backtrack 5 honeypot on backtrack 5 HOW TO INSTALL REDHAT ENTERPRISE LINUX 5 How to block ICMP request How To Install CAINE How to Install Chromium Browser on Backtrack 5 How to Install Windows 7 Ultimate How To Install Xampp On Kali Linux How to make new User in Backtrack 5 How to see files and directories on Linux how to use arduino in kali linux How to use Host Command on Backtrack 5 How to use Nano Editor on Backtrack 5 How to use Ping Command on Backtrack How to use whois tool on Backtrack 5 hping2 on backtrack 5r2 Httprint On BackTrack 5 icmpv6 flooding attack ifconfig command Installing And Accessing Backdoor On Backtrack 5 Installing software on Backtrack 5 using apt-get ipcalc on backtrack 5 Itrace On BackTrack 5 Jigsaw On Backtrack 5 Joomscan On Backtrack 5 KALI ARMITAGE ON KALI LINUX kali linux kali linux arduino Kali Linux Installation Kali Rolling Release 2016.2 keimpx on backtrack 5 Lanmap On Backtrack 4 Learn arping on Backtrack 5 Learn Basic of Internet with DAWN OF THE NET Learn Basics if Screen Utility Learn cmospwd on Backtrack 5 Learn dnsdict6 on backtrack 5 Learn fping on Backtrack 5 Learn Help Utilities Command On Backtrack 5 Learn hexedit on Backtrack 5 Learn how to hack root account on REDHAT5 Learn How to Install Backtrack 5 Learn how to make Bootable Pendrive Learn how to split Terminal into different regions Learn How To Split Terminal on backtrack 5 Learn how to use Armitage in Backtrack 5 Learn how to use chntpw on backtrack 5 LEARN HOW TO USE CISCO PACK ON BUGTRAQ - II Learn How to use ettercap on Backtrack 5 for hacking username and passwords Learn how to use Netstat Commands On Backtrack 5 Learn how to use nipper Learn How to work with Vim editor on Backtrack 5 Learn Linux Commands on Backtrack Environment Learn Netdiscover On Backtrack 5 Learn Pentbox On Backtrack 5 Learn Recoverjpeg on Backtrack 5 Learn samdump on backtrack 5 Learn TrueCrypt On Backtrack 5 LINUX NETWORKING COMMANDS ON BACKTRACK 5 linux OS LINUX PARTITION ON BACKTRACK 5 List-Urls On Backtrack 4 Load Balancing Detector On Backtrack 5 LOG REMOVER BLEACHBIT Lynis On Backtrack 5 Mac Tracker On Backtrack 5 macchanger on backtrack 5 Matriux Installation On hackingDNA Metaexploit Framework : Collecting Email Addresses Metasploit Framework With Basic Commands Meterpreter on Backtrack 5 mitre-cve on backtrack 5 MSF AUXILIARY SCANNING ON BACKTRACK 5 msf scanning on backtrack 5 nbtscan on backtrack 5 NESSUS ON BACKTRACK 5 Net Card Config Netcat : Learn how to create a instant chat session on Backtrack 5 netenum on backtrack 5 Netifera On Backtrack 5 NETMASK On Backtrack 5 NIKTO ON KALI LINUX Nmap Scanning On Backtrack 5 nmap smb script offensive security Oneko And Cowsay On BackTrack 5 OpenOffice On Backtrack 5 OpenVAS On Backtrack 5 Orion Browser History Dumper v1.0 Penetration Testing Pipal On Backtrack 5 PostgreSQL On Kali Linux Practice Session On Backtrack 5 PROTOS on backtrack 5 Reconnaissance Recover Kali Password Remote Desktop Connection Remote Desktop On Backtrack 5 Remote Desktop Sharing Removing Backdoor on Backtrack 5 Restrict Control Panel Restrict Registry Editor by Group Policies Rkhunter On Backtrack 5 router auditing tool Router Penetration Testing router security Safecopy On Backtrack 5 samba testing samrdump on backtrack 5 Scanning security auditing tool Shell Scripting On Kali Linux Shrink and Create Partition on Windows 7 Shutter On Backtrack 5 siege on backtrack 5 smb enumeration smb hacking Smbclient On Backtrack 5 Smtpscan On Backtrack 5 SMURF6 ON KALI LINUX Sniff Images on Backtrack 5 using Driftnet Snort On Backtrack 5 snurf6 Software Updates On Kali linux Spoof Your MAC Address on Backtrack 5 sql attack SSID ssldump on backtrack 5 sslstrip on backtrack 5 Start Backtrack 5 Without Startx Steam Locomotive On BackTrack5 Stop Bruteforce attack System Monitor On Backtrack 5 tcptraceroute on backtrack 5 Tctrace On Backtrack 5 TeamViewer On BackTrack 5 TELNET On Backtrack 5 Terminator On Backtrack 5 the Harvester On Backtrack 5 Things you should know about Backtrack Tweak Your System Settings On Backtrack 5 Tweak Your System Settings On Backtrack 5 Part 2 Unicornscan On BackTrack 5 Uniscan On Backtrack 5 urlcrazy on backtrack 5 urlsnarf on backtrack 5 WBOX on Backtrack 4 and 5 Weak points Web Httrack::Web Copier Websecurify On BackTrack5 Webshag On Backtrack 5 WEP CRACKING ON BACKTRACK 5 whatweb on backtrack 5 WHATWEB ON BUGTRAQ Wiffit (wafw00f): Firewall Detection Tool On Backtrack 5 wireshark Xpdf On Backtrack 5 xprobe2 on backtrack 5 Zenmap

Popular Posts