Sign in to follow this  
cloud9factor

Decrypting Hashes [Beginner to Advanced]

Recommended Posts

NDe5hQB.png

 

Hello guys, cloud9factor here. Before we start, you need to know that this is going to be a really big tutorial.

 

This tutorial is exclusive to Cracked.to and you will not find in any other forum! 

 

You will need 2 things before you start reading this tutorial

1. Patience.

2. Time.

 

This tutorial will be updated with another methods.

 

I hope you learn something and enjoy the reading. I tried to make the easiest way possible for everyone to understand.

 

All tools used in this tutorial are available to download at the end with correspondent VirusTotal scan.

 

Let's begin? 

 

First of all you need to identify the type of hash you have! We are going to do that by using a Hash Identifier.

 

 

550x200https://media.giphy.com/media/323VuHv6DwQUQrmXUn/giphy.gif[/img]

 

As you can see in the gif, we found a MD5 and a MySQL hash

 

To make it easier for you guys to understand, im going to decrypt these 2 hashed combos (MD5 & MySQL) with you, and go step by step so you can understand

 

LET'S GO!  :hype:

 

 

Method 1

 

 

 

[hide]

FindMyHash 0.2.1.1 - Decrypts MD5

 

In my opinion, this is the best free tool right now to decrypt MD5

 

Its kinda fast, the database is big and it allows you to export found and not found

 

Let's start decrypting one of the hashed combos, in this case the MD5.

 

427x317https://media.giphy.com/media/fHiauzULsudWVojFsx/giphy.gif[/img]

 

As you can see, FindMyHash decrypted 80% of the hashes  :feelsgood: 

 

That leaves us with 296 email:hash to find

 

If you want you can delete the original mail:hash (in my case i named my file, as you can see in the gif, "mail.hash 1 MD5"). From now on we are going to use the "not found.txt".

 

Now, we are going to Method 2 to decrypt the rest.[/hide]

 

 

 

Method 2

 

 

[hide]Hash Cracker Lite v1.3.2 - Decrypts MD5 & SHA1

 

This tool is good, but its a 'free version' so probably a lot of the hashes are going to the private file forcing you to buy the PRO version. 

 

However, sometimes i use it just to decrypt a little more and another reason that you are going to see in the Method 3

 

Lets see how this tool works with the "not found.txt".

 

giphy.gif

 

See? As i said, almost all of the hashes went to the PRO version. However we were able to decrypt 39. That still leaves us with 256 MD5 hash to decrypt.

 

Now in the folder that we opened in the 'Hash Cracker Lite' you are going to copy "good.txt" and "bad.txt", and paste them in the folder that contains "found.txt" and "not found.txt" that we created in the previous gif. The "good.txt" we are later going to combine with the "found.txt".

 

The "bad.txt" is now the file with mail.hash that we are going to decrypt in the Method 3. [/hide]

 

 

 

Method 3

 

 

[hide]

Hashkiller Helper - Decrypts MD5, SHA1 & NTLM

 

This tool is a very, very good! They use the Hashkiller.co.uk database that its HUGE and its daily updated! They have a DeathbyCaptcha plugin that solves the captchas (not tested this dbc - if you have and account and can lend me to test or test yourself, let me know!)

 

However, its an old tool and needs an update so there are a few problems that we need to adress before using this tool!

 

1 - You MUST USE this tool with VPN or in a RDP. Cause if you end up using too much of this tool, Hashkiller.co.uk will ban you IP! That will disable the abiity of the tool to decrypt the hashes.

 

2 - Since its using the Haskiller.co.uk decrypter format, that only allows 64 hash at a time, the tool will only be able to decrypt 64 hash at a time.

 

3 - If your "bad.txt" or "not found.txt" with hashes is still pretty big, decrypting them will be very time cosuming, cause every 64 hashes you will have to solve a captcha.

 

4 - However, the main problem of this tool is that after you finish decrypting, you wont be able to retrieve the "Not Found" hashes in the tool. This is the reason why i always leave this tool to last. BUT, if you liked this tool and if you have the DeathbyCaptcha account, there is a way to retrieve the "Not Found" with a different tool. But im going to make a tutorial in the end of the topic to show you guys how to do it.

 

Lets see how this tool works with the 256 mail.hash that we still have to find. 

 

556x250https://media.giphy.com/media/9zXFe5E29BZGPNpjDz/giphy.gif[/img]

 

Now you will copy the 'Results' into a notepad and save it.

 

As you can see the tool decrypted 230 out of the 256 hashes. Leaving us with 26, however we cant copy from the tool the 26 not found

 

But you might say: "But 26 its a really small number to care!". I agree with you! But what if it was 1000, 10000 Not Found? This is the problem with this tool. But, as i said ii will make a tutorial in the end of this topic on how to resolve this problem. 

 

Now, you used the 3 methods to crack your MD5 mail.hash combo,you will have 3 txt files. 

 

In the end of this tutorial im going to teach you how to combine them!

[/hide]

 

 

Method 4

 

 

 

[hide]

Hashkiller Online Tool, InsidePro Hash Finder and Passwords Pro. - Decrypts ALL Hashes!

 

Since we decrypted 99% of the MD5. We are going to decrypt now the MySQL mail.hash that we identified in the beginning. 

 

Now you have to understand that there are not a lot of tools to decrypt MySQL, like there are to MD5. So we are probably have a harder time to decrypt 99%, we might not even be able to make it that high porcentage!

 

In this method we use 3 different tools so it can get a bit tricky to explain, so im going to break it into 5 parts so you can understand it better!

 

PART 1 - Using Hashkiller Online Tool to divide the mail from the hash

 

We need to use this tool, because the decrypter we are going to use doesnt recognize mail:hash, only recognizes hash. So we have to separate the mail from the hash first. For that we use the hashkiller tool that its pretty easy.

 

 

700x400https://i.imgur.com/UsZor7X.gif[/img]

 

After you split them you have to copy only the hashes.

 

So now we have to get these hashes that we copied to the InsidePro Hash Finder.

 

PART 2 - InsidePro Hash Finder to decrypt the hashes

 

InsidePro its a website that decrypts the hashes in a lot of formats. It allows the maximum of 25.000.

 

However its a free tool, so a lot of the hashes will go to the private folder that you can only decrypt by paying. But its still worth it to use it!

 

Paste only the Hashes in the InsidePro, solve the recaptcha and Search for the Hashes.

 

580x482https://media.giphy.com/media/3YLmCx452tn53Rojx4/giphy.gif[/img]

 

So the InsidePro Hash Finder decrypted 4817 hashes

 

However we dont know to which email the password belongs to. For that we will need the PasswordPro. 

 

But first we need to separate the Hash from the password.

 

PART 3 - HashKiller Online Tool to separate the HASH from the PASS

 

Its just the same as the Part 1

 

750x450https://i.imgur.com/Abfn8bS.gif[/img]

 

Now you are going to save ONLY the decrypted password in a txt so that way we can open in the PasswordPro

 

PART 4 - Using PasswordPro to find which password belongs to which email.

 

Im going to show the gif, but i will detail step by step on how to do it.

 

giphy.gif

 

Step 1: Go to the Settings, Click on 'Dictionaries' and add the .txt file with the password that you saved!

 

Step 2: Import the user.hash file to the PasswordPro

 

Step 3: Select the type of hash(in this case MySQL) and the line format(In this case username:hash)

 

Step 4: Go to attack type and select 'Simple Dictionary Attack'

 

Step 5: Them click on 'Run Attack from Start'

 

After that the PasswordPro will find out which password belongs to which email

 

PART 5 - Exporting the found and not found with Password Pro.

 

Now we are going to export the found and the not found

 

U6rOk2J.gif

 

The not found is Username and Hash, always remember to EXPORT THE NOT FOUND!!!! 

 

THERE IS ANOTHER METHOD TO DECRYPT THE HASHES! 

 

So we had a 10801 mail.hash and we were able to decrypt 5560 (50%). 

 

But we can improve this porcentage a little bit more with the next Method![/hide]

 

 

 

Method 5

 

 

[hide]

Password Pro with Simple Dictionary Attack - Decrypts ALL Hashes!

 

This method is easy, but its hard. Because to work you will need to have a wordlist with the password that you want to find! 

 

There are a lot of wordlists in the internet and they can be pretty big (up to 96gb) and even them, if the password is not in the worldlist you will not decrypt it!

 

The worldlist that i am going to use is the wordlist that hashkiller.co.uk provides in their website. It has a lot of good passwords. 

 

You can find the wordlist that i used to download here: https://hashkiller.co.uk/downloads.aspx

 

However in the end of this method i will provide you a few links to download good worldlist to give it a try!

 

Lets start! 

 

Yknnwfs.png

 

The ones that i am going to use are the 'Hashkiller Passwords' and the 'HashKiller Output Wordlist'. 

 

If you download the PyscOPacK v2 make sure you have space on your computer or VM cause they are 37gb when you extract!

 

Lets try this now.

 

z50DL1b.gif

 

Lets go Step by Step

 

Step 1: Open the 'Settings' and go to Dictionary. Delete the file in there (you can leave the file, however i know all passwords in there will be useless cause we already tried them, so i deleted because if i leave it it will check that file and take a little longer) and open the wordlist that you downloaded! (in this case i used 2).

 

Step 2: Go to the main page and delete all the user (You can also leave it, it will decrypt)

 

Step 3: If you deleted, like i did, go and Import the "not found.txt" that we saved earlier.

 

Step 4: Make sure  the attack type is 'Simple Dictionary Attack'

 

Step 5: Click on 'Run the attack from start'

 

Now, you will also save the found and the not found. Look at the second gif, of the PART 5 from the Method 4.

 

As you can see, we were able to find 1165 password out of 5241 that we had in the 'not found.txt'. 

 

We can find a lot more. However, you will need different worldlists

 

As promised here are a few links for you to find wordlists

 

1-  https://thehacktoday.com/password-cracking-dictionarys-download-for-free/

2 - https://weakpass.com/wordlist/huge

3 - https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm

4 - https://wiki.skullsecurity.org/Passwords

5 - http://blog.g0tmi1k.com/2011/06/dictionaries-wordlists/?redirect

 

But know that Password Pro only recognizes .txt and .dic extension!!! Some wordlists are .lst that PasswordPro will not recognize!

[/hide]

 

 

Method 6

 

 

[hide]

Paying and Asking for Help - Decrypts ALL Hashes

 

 

I leave this Method for last cause it requires you to pay or requires the help of others.

 

Part 1: Paying to decrypt hashes

 

I recommend that you use the InsidePro Hash Finder Client

Their database is big, the price is very low(1$ for 500k hashes  :kek: ) and they decrypt pretty much all the formats that you are going to find.

 

But you can also look it up at the marketplace of the forum, sometimes there are people that offer their services to decrypt for a few bucks.

 

A few examples of dehashing services in the marketplace are:

Link 1: https://cracked.to/Thread-Combo-dehashing-service

 

 

Part 2: Asking for help of other

 

You can ask for help in the "Cracking Help" area of the forum.

 

But what i really recommend is that you ask for help in the HashKiller forum, their forum is very active and they really help if you need! 

 

But remember to only post your HASH, however you are literally giving away your combo![/hide]

 

 

 

Method 7

 

[hide]UNDER CONSTRUCTION - will be updated[/hide]

 

 

Questions you might have!

 

 

[hide]1- "I did Method 1, 2 and 3 now i have 3 separate txt files! How do i combine them??"

 

Under Construction!

 

2 - "You said you were going to show us how to retrieve the 'Not found' from the Hashkiller Helper tool! Where is that tutorial?"

 

Under Construction!

 

3 - "Help me! I found 4 different types of MD5 in the InsidePro! What do i do???"

 

Under Construction!

 

4- "But my combo its 50000! How do i decrypt them if InsidePro only allows maximum of 25000???"

 

Under Construction![/hide]

 

 

 

Downloads Links!

 

 

[hide]1 - FindMyHash 0.2.1.1

 

Link: https://anonfiles.com/tbx9A0k8b6/FindMyHash_rar 

VT: https://www.virustotal.com/#/file/dcfa1a1db6368e80d4580f2f652430d0b2eb7183f17ab787e09372106e232c32/detection

 

2 - Hash Identifier

 

Link: https://anonfiles.com/I5xeAdkcbc/Hash_Identifier_rar

VT: https://www.virustotal.com/#/file/4a114ee9b67a559bb4f6246f341e1625ba4be6f9a531fe3ae91e16502a5867b1/detection

 

3 - HashKiller Helper

 

Link: https://anonfiles.com/51y7A0k8be/Hashkiller_Help_zip

VT: https://www.virustotal.com/#/file/84ebd8f0598803fcc0a346a132e2ff10705062ff0115a765a7cd0892ed133a1c/detection

 

4 - HashCracker Lite 1.3.2

 

Link: https://anonfiles.com/D5ybAbk7bb/HashCracker_Lite_1.3.2_rar

VT: https://www.virustotal.com/#/file/ea35d5c7d6e75250d28bf78da0b86491e9e1fee19c212d8265e6b03615d4d08b/detection

 

5 - PasswordPRO

 

Link: https://anonfiles.com/f2z0A0k8bf/passwordspro_zip

VT: https://www.virustotal.com/#/file/98790456c9ba045919c78efdb9382ff63a847ddfbbd5d20ba356038d528b1b0b/detection

 

6 - Combos used in this tutorial (MD5 and MySQL)

 

Link: https://anonfiles.com/W82bA1k1b0/combo_rar

VT: https://www.virustotal.com/#/file/79c571a0425c89cc29132c4e46424bcc4b909035fdab2aa5a61b674c53ea865b/detection

 

7 - HashKiller Online Tool

 

Link: https://hashkiller.co.uk/list-tool.aspx

 

8 - InsidePro Hash Finder

 

Link: http://finder.insidepro.team/

 

EVEN THOUGH ITS CLEAN! ITS BETTER TO USE EVERYTHING ON RDP, VM![/hide]

 

 

Please leave a LIKE!   fiesta_parrot.gif Dont be a LEECHER!

IfjiHLo.gif

Share this post


Link to post
Share on other sites

This will prove extremely useful and I think I'll be able to help out more when I get the hang of this. I've left my like, brother.

Share this post


Link to post
Share on other sites

This will prove extremely useful and I think I'll be able to help out more when I get the hang of this. I've left my like, brother.

Share this post


Link to post
Share on other sites

Thanks For This Great Share. Really Appreciate Your Hard Work!

Share this post


Link to post
Share on other sites

appreciate the share

Share this post


Link to post
Share on other sites

 

:pupper: :pupper: :pupper: :pupper:

Share this post


Link to post
Share on other sites

okay im using password pro and hash finder lets see if i get some new info here cool

Share this post


Link to post
Share on other sites

This can help me decrypt a couple of hashes thanks genuinely!

Share this post


Link to post
Share on other sites

wonderfull, youre amazing! man!

Share this post


Link to post
Share on other sites

I'm getting a really low success rate with ORHT. I will try to see if I can get more passwords with your method. Thanks!

Share this post


Link to post
Share on other sites

Thanks For This Great Share. Really Appreciate Your Hard Work!

Share this post


Link to post
Share on other sites

NDe5hQB.png

 

Hello guys, cloud9factor here. Before we start, you need to know that this is going to be a really big tutorial.

 

This tutorial is exclusive to Cracked.to and you will not find in any other forum! 

 

You will need 2 things before you start reading this tutorial

1. Patience.

2. Time.

 

This tutorial will be updated with another methods.

 

I hope you learn something and enjoy the reading. I tried to make the easiest way possible for everyone to understand.

 

All tools used in this tutorial are available to download at the end with correspondent VirusTotal scan.

 

Let's begin? 

 

First of all you need to identify the type of hash you have! We are going to do that by using a Hash Identifier.

 

 

550x200https://media.giphy.com/media/323VuHv6DwQUQrmXUn/giphy.gif[/img]

 

As you can see in the gif, we found a MD5 and a MySQL hash

 

To make it easier for you guys to understand, im going to decrypt these 2 hashed combos (MD5 & MySQL) with you, and go step by step so you can understand

 

LET'S GO!  :hype:

 

 

Method 1

 

 

 

 

 

 

Please leave a LIKE!   fiesta_parrot.gif Dont be a LEECHER!

IfjiHLo.gif

 

Fucking a thank you

Share this post


Link to post
Share on other sites

I hope that I atleast can learn something new.thx

Share this post


Link to post
Share on other sites

this looks interesting and will definitely be useful

Share this post


Link to post
Share on other sites

Thanks so much

 

hoolly shit good job


this is the shit

Share this post


Link to post
Share on other sites

Thanks for sharing. Very useful

Share this post


Link to post
Share on other sites

appericiate the work man

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this