MD5 HASH
Format = karakter hexa 0-F
Panjang = 32 karakter

Contoh md5 hash
84e3fbdf4986585d06d4e7aa2c2e2be7
555f70a1c266100421e2cf45d62a3938

Cara crack
save hashes dalam format id:hash, id boleh apa aja, kita pake nomer aja biar ke urut
Code:
1:84e3fbdf4986585d06d4e7aa2c2e2be7
2:1a1dc91c907325c69271ddf0c944bc72
save sebagai crack.txt, lalu crack dengan perintah
Quote:# menggunakan wordlist yg saya taro di /media/DATA2/wordlist/all.lst
./john --wordlist=/media/DATA2/wordlist/all.lst --format=raw-md5 crack.txt
Loaded 2 password hashes with no different salts (Raw MD5 [raw-md5 SSE2 16x4])
c0de (1)
pass (2)
guesses: 2 time: 0:00:00:00 100.00% (ETA: Tue Jan 25 09:43:10 2011) c/s: 5389 trying: franklin - system

# atau di bruteforce, incremental bisa dipilih antara alnum,alpha,all,etc liat folder john, file yg berakhiran .chr
./john --incremental=alnum --format=raw-md5 crack.txt
Loaded 2 password hashes with no different salts (Raw MD5 [raw-md5 SSE2 16x4])
pass (2)
c0de (1)
guesses: 2 time: 0:00:00:00 c/s: 994836 trying: 4apm - c0df
Berhasil, tuh passwordnya c0de dan pass



MD4 HASH
Format = karakter hexa 0-F
Panjang = 32 karakter

Contoh md4 hash
a2a9d88a2965472048022a72ee9b654a
52e9e9e4f1cd6d1abc78aa866d2a5509

Cara crack
save hashes dalam format id:hash, id boleh apa aja, kita pake nomer aja biar ke urut
Code:
1:a2a9d88a2965472048022a72ee9b654a
2:52e9e9e4f1cd6d1abc78aa866d2a5509
save sebagai crack.txt, lalu crack dengan perintah
Quote:# menggunakan wordlist yg saya taro di /media/DATA2/wordlist/all.lst
./john --wordlist=/media/DATA2/wordlist/all.lst --format=raw-md4 crack.txt

# atau di bruteforce, incremental bisa dipilih antara alnum,alpha,all,etc liat folder john, file yg berakhiran .chr
./john --incremental=alnum --format=raw-md4 crack.txt



SHA1 HASH
Format = karakter hexa 0-F
Panjang = 40 karakter

Contoh sha1 hash
39b228b789d9202d6bbc05ea13d486d2d1e5e5fc
9d4e1e23bd5b727046a9e3b4b7db57bd8d6ee684

Cara crack
save hashes dalam format id:hash, id boleh apa aja, kita pake nomer aja biar ke urut
Code:
1:39b228b789d9202d6bbc05ea13d486d2d1e5e5fc
2:9d4e1e23bd5b727046a9e3b4b7db57bd8d6ee684
save sebagai crack.txt, lalu crack dengan perintah
Quote:# menggunakan wordlist yg saya taro di /media/DATA2/wordlist/all.lst
./john --wordlist=/media/DATA2/wordlist/all.lst --format=raw-sha1 crack.txt

# atau di bruteforce, incremental bisa dipilih antara alnum,alpha,all,etc liat folder john, file yg berakhiran .chr
./john --incremental=alnum --format=raw-sha1 crack.txt



JOOMLA HASH
Format = karakter hexa 0-F + Salt
Salt = 16 karakter (alpha numeric)
Panjang = 32 karakter + 16 karakter (Salt)
md5($password . $salt);

Contoh joomla hash
0afa236b9490fef1c0fde90eddb5a7f5:YEfafQuaj58ExG3V
5c3c273efa3523c4bbfb318d23fd9952:tNT52oL0I8ClmMjO

Cara crack
save hashes dalam format id:md5_gen(1)hash$salt, id boleh apa aja, kita pake nomer aja biar ke urut
Code:
1:md5_gen(1)0afa236b9490fef1c0fde90eddb5a7f5$YEfafQuaj58ExG3V
2:md5_gen(1)5c3c273efa3523c4bbfb318d23fd9952$tNT52oL0I8ClmMjO
save sebagai crack.txt, lalu crack dengan perintah
Quote:# menggunakan wordlist yg saya taro di /media/DATA2/wordlist/all.lst
./john --wordlist=/media/DATA2/wordlist/all.lst --subformat=md5_gen\(1\) crack.txt

# atau di bruteforce, incremental bisa dipilih antara alnum,alpha,all,etc liat folder john, file yg berakhiran .chr
./john --incremental=alnum --subformat=md5_gen\(1\) crack.txt



PHPASS (WORDPRESS/PHPBB3) HASH
Format = $P$/$H$ + B/9 + SALT + HASH
Panjang = 34 karakter

Contoh phpass hash
$P$937lj8T3rci18KkTykssJJWHrtsVtb/
$P$9A0K1lIdw.kor5gTe41Js5KnAhWI9p0

Cara crack
save hashes dalam format id:hash, id boleh apa aja, kita pake nomer aja biar ke urut
Code:
1:$P$937lj8T3rci18KkTykssJJWHrtsVtb/
2:$P$9A0K1lIdw.kor5gTe41Js5KnAhWI9p0
save sebagai crack.txt, lalu crack dengan perintah
Quote:# menggunakan wordlist yg saya taro di /media/DATA2/wordlist/all.lst
./john --wordlist=/media/DATA2/wordlist/all.lst --subformat=md5_gen\(17\) crack.txt

# atau di bruteforce, incremental bisa dipilih antara alnum,alpha,all,etc liat folder john, file yg berakhiran .chr
./john --incremental=alnum --subformat=md5_gen\(17\) crack.txt



MD5 UNIX
Format = $1$ + SALT + $ + HASH
Panjang = 34 karakter

Contoh md5 unix hash
$1$QQa2/imc$KKcokGZ.1KmqNLrBgJAFK0
$1$cXjVAJx4$uUQtJgL4u8Kj8R6lnTbTT0

Cara crack
save hashes dalam format id:hash, id boleh apa aja, kita pake nomer aja biar ke urut
Code:
1:$1$QQa2/imc$KKcokGZ.1KmqNLrBgJAFK0
2:$1$cXjVAJx4$uUQtJgL4u8Kj8R6lnTbTT0
save sebagai crack.txt, lalu crack dengan perintah
Quote:# menggunakan wordlist yg saya taro di /media/DATA2/wordlist/all.lst
./john --wordlist=/media/DATA2/wordlist/all.lst --format=md5 crack.txt

# atau di bruteforce, incremental bisa dipilih antara alnum,alpha,all,etc liat folder john, file yg berakhiran .chr
./john --incremental=alnum --format=md5 crack.txt



VBULLETIN HASH
Format = karakter hexa 0-F + Salt
Panjang = 32 karakter + (3 karakter Salt)
md5(md5($password) . $salt)

Contoh vbulletin hash
5ed2aa7420efed95a285828cd0df7023:iC0
3c8a04fa2caea2d69585f0b7add4241e:VPM

Cara crack
save hashes dalam format id~md5_gen(7)hash$salt, id boleh apa aja, kita pake nomer aja biar ke urut
Code:
1~md5_gen(7)5ed2aa7420efed95a285828cd0df7023$iC0
2~md5_gen(7)3c8a04fa2caea2d69585f0b7add4241e$VPM
save sebagai crack.txt, lalu crack dengan perintah
Quote:# menggunakan wordlist yg saya taro di /media/DATA2/wordlist/all.lst
./john --wordlist=/media/DATA2/wordlist/all.lst --subformat=md5_gen\(7\) --field-separator-char="~" crack.txt

# atau di bruteforce, incremental bisa dipilih antara alnum,alpha,all,etc liat folder john, file yg berakhiran .chr
./john --incremental=alnum --subformat=md5_gen\(7\) --field-separator-char="~" crack.txt


List dari subformat yg ane pake (liat pake perintah : john --subformat=LIST
Format = dynamic_0 type = dynamic_0: md5($p) (raw-md5)
Format = dynamic_1 type = dynamic_1: md5($p.$s) (joomla)
Format = dynamic_2 type = dynamic_2: md5(md5($p)) (e107)
Format = dynamic_3 type = dynamic_3: md5(md5(md5($p)))
Format = dynamic_4 type = dynamic_4: md5($s.$p) (OSC)
Format = dynamic_5 type = dynamic_5: md5($s.$p.$s)
Format = dynamic_6 type = dynamic_6: md5(md5($p).$s)
Format = dynamic_7 type = dynamic_7: md5(md5($p).$s) (vBulletin)
Format = dynamic_8 type = dynamic_8: md5(md5($s).$p)
Format = dynamic_9 type = dynamic_9: md5($s.md5($p))
Format = dynamic_10 type = dynamic_10: md5($s.md5($s.$p))
Format = dynamic_11 type = dynamic_11: md5($s.md5($p.$s))
Format = dynamic_12 type = dynamic_12: md5(md5($s).md5($p)) (IPB)
Format = dynamic_13 type = dynamic_13: md5(md5($p).md5($s))
Format = dynamic_14 type = dynamic_14: md5($s.md5($p).$s)
Format = dynamic_15 type = dynamic_15: md5($u.md5($p).$s)
Format = dynamic_16 type = dynamic_16: md5(md5(md5($p).$s).$s2)
Format = dynamic_17 type = dynamic_17: phpass ($P$ or $H$)
Format = dynamic_18 type = dynamic_18: md5($s.Y.$p.0xF7.$s) (Post.Office MD5)
Format = dynamic_19 type = dynamic_19: Cisco PIX (MD5)
Format = dynamic_20 type = dynamic_20: Cisco PIX (MD5 salted)
Format = dynamic_21 type = dynamic_21: HTTP Digest Access Auth
Format = dynamic_22 type = dynamic_22: md5(sha1($p))
Format = dynamic_23 type = dynamic_23: sha1(md5($p))
Format = dynamic_24 type = dynamic_24: sha1($p.$s)
Format = dynamic_25 type = dynamic_25: sha1($s.$p)
Format = dynamic_26 type = dynamic_26: sha1($p) raw-sha1
Format = dynamic_27 type = dynamic_27: FreeBSD MD5
Format = dynamic_28 type = dynamic_28: Apache MD5
Format = dynamic_29 type = dynamic_29: md5(unicode($p))
UserFormat = dynamic_1001 type = dynamic_1001 md5(md5(md5(md5($p))))
UserFormat = dynamic_1002 type = dynamic_1002 md5(md5(md5(md5(md5($p)))))
UserFormat = dynamic_1003 type = dynamic_1003 md5(md5($p).md5($p))
UserFormat = dynamic_1004 type = dynamic_1004 md5(md5(md5(md5(md5(md5($p))))))
UserFormat = dynamic_1005 type = dynamic_1005 md5(md5(md5(md5(md5(md5(md5($p)))))))
UserFormat = dynamic_1006 type = dynamic_1006 md5(md5(md5(md5(md5(md5(md5(md5($p))))))))
UserFormat = dynamic_1007 type = dynamic_1007 md5(md5($p).$s) [vBulletin]
UserFormat = dynamic_1008 type = dynamic_1008 md5($p.$s) [RADIUS User-Password]
UserFormat = dynamic_1009 type = dynamic_1009 md5($s.$p) [RADIUS Responses]

Silahkan di coba
asik

Author: Revres Tanur

0 komentar:

Post a Comment

 
Top