mirror of
https://github.com/trustedsec/hate_crack.git
synced 2025-12-12 15:49:19 -08:00
223 lines
8.2 KiB
Markdown
223 lines
8.2 KiB
Markdown
```
|
|
___ ___ __ _________ __
|
|
/ | \_____ _/ |_ ____ \_ ___ \____________ ____ | | __
|
|
/ ~ \__ \\ __\/ __ \ / \ \/\_ __ \__ \ _/ ___\| |/ /
|
|
\ Y // __ \| | \ ___/ \ \____| | \// __ \\ \___| <
|
|
\___|_ /(____ /__| \___ >____\______ /|__| (____ /\___ >__|_ \
|
|
\/ \/ \/_____/ \/ \/ \/ \/
|
|
```
|
|
|
|
## Installation
|
|
Get the latest hashcat binaries (https://hashcat.net/hashcat/)
|
|
|
|
```
|
|
git clone https://github.com/hashcat/hashcat.git
|
|
cd hashcat/
|
|
make
|
|
make install
|
|
```
|
|
### Download hate_crack
|
|
```git clone https://github.com/trustedsec/hate_crack.git```
|
|
* Customize binary and wordlist paths in "config.json"
|
|
* Make sure that at least "rockyou.txt" is within your "wordlists" path
|
|
### Create Optimized Wordlists
|
|
wordlist_optimizer.py - parses all wordlists from `<input file list>`, sorts them by length and de-duplicates into `<output directory>`
|
|
|
|
```$ python wordlist_optimizer.py
|
|
usage: python wordlist_optimizer.py <input file list> <output directory>
|
|
|
|
$ python wordlist_optimizer.py wordlists.txt ../optimized_wordlists
|
|
```
|
|
-------------------------------------------------------------------
|
|
## Usage
|
|
`$ ./hate_crack.py
|
|
usage: python hate_crack.py <hash_file> <hash_type>`
|
|
|
|
The <hash_type> is attained by running `hashcat --help`
|
|
|
|
Example Hashes: http://hashcat.net/wiki/doku.php?id=example_hashes
|
|
|
|
|
|
```
|
|
$ hashcat --help |grep -i ntlm
|
|
5500 | NetNTLMv1 | Network protocols
|
|
5500 | NetNTLMv1 + ESS | Network protocols
|
|
5600 | NetNTLMv2 | Network protocols
|
|
1000 | NTLM | Operating-Systems
|
|
```
|
|
|
|
```
|
|
$ ./hate_crack.py <hash file> 1000
|
|
|
|
___ ___ __ _________ __
|
|
/ | \_____ _/ |_ ____ \_ ___ \____________ ____ | | __
|
|
/ ~ \__ \\ __\/ __ \ / \ \/\_ __ \__ \ _/ ___\| |/ /
|
|
\ Y // __ \| | \ ___/ \ \____| | \// __ \\ \___| <
|
|
\___|_ /(____ /__| \___ >____\______ /|__| (____ /\___ >__|_ \
|
|
\/ \/ \/_____/ \/ \/ \/ \/
|
|
Version 1.09
|
|
|
|
|
|
(1) Quick Crack
|
|
(2) Extensive Pure_Hate Methodology Crack
|
|
(3) Brute Force Attack
|
|
(4) Top Mask Attack
|
|
(5) Fingerprint Attack
|
|
(6) Combinator Attack
|
|
(7) Hybrid Attack
|
|
(8) Pathwell Top 100 Mask Brute Force Crack
|
|
(9) PRINCE Attack
|
|
(10) YOLO Combinator Attack
|
|
(11) Middle Combinator Attack
|
|
(12) Thorough Combinator Attack
|
|
(13) Bandrel Methodology
|
|
|
|
(95) Analyze hashes with Pipal
|
|
(96) Export Output to Excel Format
|
|
(97) Display Cracked Hashes
|
|
(98) Display README
|
|
(99) Quit
|
|
|
|
Select a task:
|
|
```
|
|
-------------------------------------------------------------------
|
|
#### Quick Crack
|
|
* Runs a dictionary attack using all wordlists configured in your "hcatOptimizedWordlists" path
|
|
and optionally applies a rule that can be selected from a list by ID number. Multiple rules can be selected by using a
|
|
comma separated list, and chains can be created by using the '+' symbol.
|
|
|
|
```
|
|
Which rule(s) would you like to run?
|
|
(1) best64.rule
|
|
(2) d3ad0ne.rule
|
|
(3) T0XlC.rule
|
|
(4) dive.rule
|
|
(99) YOLO...run all of the rules
|
|
Enter Comma separated list of rules you would like to run. To run rules chained use the + symbol.
|
|
For example 1+1 will run best64.rule chained twice and 1,2 would run best64.rule and then d3ad0ne.rule sequentially.
|
|
Choose wisely:
|
|
```
|
|
|
|
|
|
|
|
|
|
#### Extensive Pure_Hate Methodology Crack
|
|
Runs several attack methods provided by Martin Bos (formerly known as pure_hate)
|
|
* Brute Force Attack (7 characters)
|
|
* Dictionary Attack
|
|
* All wordlists in "hcatOptimizedWordlists" with "best64.rule"
|
|
* wordlists/rockyou.txt with "d3ad0ne.rule"
|
|
* wordlists/rockyou.txt with "T0XlC.rule"
|
|
* Top Mask Attack (Target Time = 4 Hours)
|
|
* Fingerprint Attack
|
|
* Combinator Attack
|
|
* Hybrid Attack
|
|
* Extra - Just For Good Measure
|
|
- Runs a dictionary attack using wordlists/rockyou.txt with chained "combinator.rule" and "InsidePro-PasswordsPro.rule" rules
|
|
|
|
#### Brute Force Attack
|
|
Brute forces all characters with the choice of a minimum and maximum password length.
|
|
|
|
#### Top Mask Attack
|
|
Uses StatsGen and MaskGen from PACK (https://thesprawl.org/projects/pack/) to perform a top mask attack using passwords already cracked for the current session.
|
|
Presents the user a choice of target cracking time to spend (default 4 hours).
|
|
|
|
#### Fingerprint Attack
|
|
https://hashcat.net/wiki/doku.php?id=fingerprint_attack
|
|
|
|
Runs a fingerprint attack using passwords already cracked for the current session.
|
|
|
|
#### Combinator Attack
|
|
https://hashcat.net/wiki/doku.php?id=combinator_attack
|
|
|
|
Runs a combinator attack using the "rockyou.txt" wordlist.
|
|
|
|
#### Hybrid Attack
|
|
https://hashcat.net/wiki/doku.php?id=hybrid_attack
|
|
|
|
* Runs several hybrid attacks using the "rockyou.txt" wordlists.
|
|
- Hybrid Wordlist + Mask - ?s?d wordlists/rockyou.txt ?1?1
|
|
- Hybrid Wordlist + Mask - ?s?d wordlists/rockyou.txt ?1?1?1
|
|
- Hybrid Wordlist + Mask - ?s?d wordlists/rockyou.txt ?1?1?1?1
|
|
- Hybrid Mask + Wordlist - ?s?d ?1?1 wordlists/rockyou.txt
|
|
- Hybrid Mask + Wordlist - ?s?d ?1?1?1 wordlists/rockyou.txt
|
|
- Hybrid Mask + Wordlist - ?s?d ?1?1?1?1 wordlists/rockyou.txt
|
|
|
|
#### Pathwell Top 100 Mask Brute Force Crack
|
|
Runs a brute force attack using the top 100 masks from KoreLogic:
|
|
https://blog.korelogic.com/blog/2014/04/04/pathwell_topologies
|
|
|
|
#### PRINCE Attack
|
|
https://hashcat.net/events/p14-trondheim/prince-attack.pdf
|
|
|
|
Runs a PRINCE attack using wordlists/rockyou.txt
|
|
|
|
#### YOLO Combinator Attack
|
|
Runs a continuous combinator attack using random wordlists from the
|
|
optimized wordlists for the left and right sides.
|
|
|
|
#### Middle Combinator Attack
|
|
https://jeffh.net/2018/04/26/combinator_methods/
|
|
|
|
Runs a modified combinator attack adding a middle character mask:
|
|
wordlists/rockyou.txt + masks + worklists/rockyou.txt
|
|
|
|
Where the masks are some of the most commonly used separator characters:
|
|
2 4 <space> - _ , + . &
|
|
|
|
#### Thorough Combinator Attack
|
|
https://jeffh.net/2018/04/26/combinator_methods/
|
|
|
|
* Runs many rounds of different combinator attacks with the rockyou list.
|
|
- Standard Combinator attack: rockyou.txt + rockyou.txt
|
|
- Middle Combinator attack: rockyou.txt + ?n + rockyou.txt
|
|
- Middle Combinator attack: rockyou.txt + ?s + rockyou.txt
|
|
- End Combinator attack: rockyou.txt + rockyou.txt + ?n
|
|
- End Combinator attack: rockyou.txt + rockyou.txt + ?s
|
|
- Hybrid middle/end attack: rockyou.txt + ?n + rockyou.txt + ?n
|
|
- Hybrid middle/end attack: rockyou.txt + ?s + rockyou.txt + ?s
|
|
|
|
|
|
#### Bandrel Methodology
|
|
|
|
* Prompts for input of comma separated names and then creates a pseudo hybrid attack by capitalizing the first letter
|
|
and adding up to six additional characters at the end. Each word is limited to a total of five minutes.
|
|
- Built in additional common words including seasons, months has been included as a customizable config.json entry
|
|
- The default five minute time limit is customizable via the config.json
|
|
|
|
-------------------------------------------------------------------
|
|
### Version History
|
|
Version 1.9
|
|
Revamped the hate_crack output to increase processing speed exponentially combine_ntlm_output function for combining
|
|
Introducing New Attack mode "Bandrel Methodology"
|
|
Updated pipal function to output top x number of basewords
|
|
|
|
Version 1.08
|
|
Added a Pipal menu Option to analyze hashes. https://github.com/digininja/pipal
|
|
|
|
Version 1.07
|
|
Minor bug fixes with pwdump formating and unhexify function
|
|
|
|
Version 1.06
|
|
Updated the quick crack and recylcing functions to use user customizable rules.
|
|
|
|
Version 1.05
|
|
Abstraction of rockyou.txt so that you can use whatever dictionary that you would like to specified in the config.json
|
|
Minor change the quickcrack that allows you to specify 0 for number of times best64 is chained
|
|
|
|
Version 1.04
|
|
Two new attacks Middle Combinator and Thorough Combinator
|
|
|
|
Version 1.03
|
|
Introduction of new feature to use session files for multiple concurrent sessions of hate_crack
|
|
Minor bug fix
|
|
|
|
Version 1.02
|
|
Introduction of new feature to export the output of pwdump formated NTDS outputs to excel with clear-text passwords
|
|
|
|
Version 1.01
|
|
Minor bug fixes
|
|
|
|
Version 1.00
|
|
Initial public release
|