Clone of . For those who would prefer to not be tracked by MS.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

200 lines
18 KiB

5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
  1. # Password Bruting and Hashcracking
  2. ## Table of Contents
  3. * [General](#general)
  4. * [Making Better Passwords](#better)
  5. * [Cracking Passwords/Hashes](#crack)
  6. * [General Cracking Tools](#generalt)
  7. * [App Specific Tools](#appt)
  8. * [Write-ups/Guides](#writeup)
  9. * [Miscellaneous](#misc)
  10. * [Wordlists](#wordlist)
  11. * [Wordlist Generation](#)
  12. * [Talks & Presentations](#)
  13. * [Papers](#papers)
  14. #### Sort
  15. #### End cull
  16. ### <a name="general">General</a>
  17. * [How I became a password cracker](
  18. * [HashView](
  19. * Hashview is a tool for security professionals to help organize and automate the repetitious tasks related to password cracking. Hashview is a web application that manages hashcat ( commands. Hashview strives to bring constiency in your hashcat tasks while delivering analytics with pretty pictures ready for ctrl+c, ctrl+v into your reports.
  20. * [Hashtag](
  21. * Password hash identification tool written in python
  22. * [List of hash types/examples](
  23. * [Password Recovery Speeds](
  24. * Password cracking time measurements
  25. * [Password cracking, mining, and GPUs](
  26. ### <a name="better">Making Better Passwords</a>
  27. [Mnemonic Password Formulas](
  28. * The current information technology landscape is cluttered with a large number of information systems that each have their own individual authentication schemes. Even with single sign-on and multi-system authentication methods, systems within disparate management domains are likely to be utilized by users of various levels of involvement within the landscape as a whole. Due to this complexity and the abundance of authentication requirements, many users are required to manage numerous credentials across various systems. This has given rise to many different insecurities relating to the selection and management of passwords. This paper details a subset of issues facing users and managers of authentication systems involving passwords, discusses current approaches to mitigating those issues, and finally introduces a new method for password management and recalls termed Mnemonic Password Formulas.
  29. ### <a name="crack">Cracking Passwords/Hashes</a>
  30. * [Introduction to Cracking Hashes](
  31. * Good introduction source to hash cracking.
  32. * [Cracking Corporate Passwords Exploiting Password Policy Weaknesses - Minga Rick Redm - Derbycon3](
  33. * [HashView](
  34. * Hashview is a tool for security professionals to help organize and automate the repetitious tasks related to password cracking. Hashview is a web application that manages hashcat ( commands. Hashview strives to bring constiency in your hashcat tasks while delivering analytics with pretty pictures ready for ctrl+c, ctrl+v into your reports.
  35. * [Cracking Active Directory Passwords or �How to Cook AD Crack"](
  36. * [Cracking Corporate Passwords � Exploiting Password Policy Weaknesses - Minga / Rick Redman Derbycon 2013](
  37. * [hcxtools](
  38. * Small set of tools to capture and convert packets from wlan devices (h = hash, c = capture, convert and calculate candidates, x = different hashtypes) for the use with latest hashcat or John the Ripper. The tools are 100% compatible to hashcat and John the Ripper and recommended by hashcat. This branch is pretty closely synced to hashcat git branch (that means: latest hcxtools matching on latest hashcat beta) and John the Ripper git branch ( "bleeding-jumbo").
  39. * [PACK (Password Analysis and Cracking Toolkit)](
  40. * PACK (Password Analysis and Cracking Toolkit) is a collection of utilities developed to aid in analysis of password lists in order to enhance password cracking through pattern detection of masks, rules, character-sets and other password characteristics. The toolkit generates valid input files for Hashcat family of password crackers.
  41. ### <a name="appt">App Specific Tools(as in single application focus)</a>
  42. * [crackxls2003 0.4](
  43. * This program may be used to break the encryption on Microsoft Excel and Microsoft Word file which have been encrypted using the RC4 method, which uses a 40-bit-long key. This was the default encryption method in Word and Excel 97/2000/2002/2003. This program will not work on files encrypted using Word or Excel 2007 or later, or for versions 95 or earlier. It will not work if a file was encrypted with a non-default method. Additionally, documents created with the Windows system locale set to France may use a different encryption method.
  44. * [mod0keecrack](
  45. * mod0keecrack is a simple tool to crack/bruteforce passwords of KeePass 2 databases. It implements a KeePass 2 Database file parser for .kdbx files, as well as decryption routines to verify if a supplied password is correct. mod0keecrack only handles the encrypted file format and is not able to parse the resulting plaintext database. The only purpose of mod0keecrack is the brute-forcing of a KeePass 2 database password.
  46. #### OCL/Hashcat
  47. * General
  48. * [OCL hashcat wiki](
  49. * Its the Wiki
  50. * [OCL hashcat](
  51. * It�s OCL hashcat
  52. * Hashcat attacks
  53. * [Mask atttack](
  54. * Try all combinations from a given keyspace just like in Brute-Force attack, but more specific.
  55. * [Combinator attack](
  56. * Each word of a dictionary is appended to each word in a dictionary.
  57. * [Dictionary attack](
  58. * The dictionary attack is a very simple attack mode. It is also known as a �Wordlist attack�.
  59. * [Fingerprint Attack](
  60. * The Fingerprint attack is a combination of the results of the expander with a combination engine. It is an automatically generated attack on pattern that works fine on GPGPU.
  61. * [Hybrid attack](
  62. * Basically, the hybrid attack is just a Combinator attack. One side is simply a dictionary, the other is the result of a Brute-Force attack. In other words, the full Brute-Force keyspace is either appended or prepended to each of the words from the dictionary. That's why it's called �hybrid�.
  63. * [Mask attack](
  64. * Try all combinations from a given keyspace just like in Brute-Force attack, but more specific.
  65. * [Permutation attack[(
  66. * Each word in a dictionary generates all permutations of itself.
  67. * [Rule Based attack](
  68. * The rule-based attack is one of the most complicated of all the attack modes. The reason for this is very simple. The rule-based attack is like a programming language designed for password candidate generation. It has functions to modify, cut or extend words and has conditional operators to skip some, etc. That makes it the most flexible, accurate and efficient attack.
  69. * [Table Lookup attack](
  70. * With each word in our dictionary, it automatically generates masks as in a batch of Mask attack.
  71. * [Toggle-Case attack](
  72. * For each word in a dictionary, all possible combinations of upper- and lower-case variants are generated.
  73. * [OCLHashcat Hash Examples + hash code](
  74. ### <a name="writeup">Writeups</a>
  75. * [How to crack password hashes efficiently](
  76. * Excellent writeup/methodology explanation
  77. * [Building a Better GPU based hash cracking methodology]( Penr-methodology/)
  78. * Bit basic advice but still great advice nonetheless
  79. * [5min Guide to setting up a GPU cracker in the cloud on AWS + a script to automate it all](
  80. * [Dumping a Domains worth of passwords using mimikatz](
  81. * [Dump Windows password hashes efficiently - Part 1](
  82. ### <a name="generalt">Tools</a>
  83. * [Patator](
  84. * Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors.
  85. * [Firefox password cracker](
  86. * [Cracklord](
  87. * CrackLord is a system designed to provide a scalable, pluggable, and distributed system for both password cracking as well as any other jobs needing lots of computing resources. Better said, CrackLord is a way to load balance the resources, such as CPU, GPU, Network, etc. from multiple hardware systems into a single queueing service across two primary services: the Resource and Queue. It won't make these tasks faster, but it will make it easier to manage them.
  88. * [Dagon](
  89. * Named after the prince of Hell, Dagon (day-gone) is an advanced hash cracking and manipulation system, capable of bruteforcing multiple hash types, creating bruteforce dictionaries, automatic hashing algorithm verification, random salt generation from Unicode to ASCII, and much more.
  90. * [Gladius](
  91. * Automated Responder/ cracking. Gladius provides an automated method for cracking credentials from various sources during an engagement. We currently crack hashes from Responder,, and smart_hashdump.
  92. ### <a name="wordlistgen">Wordlist Generation</a>
  93. * [GitDigger](
  94. * gitDigger: Creating realworld wordlists from github hosted data.
  95. * [Wikigen](
  96. * A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur
  97. * [CeWL](
  98. * CeWL is a ruby app which spiders a given url to a specified depth, optionally following external links, and returns a list of words which can then be used for password crackers such as John the Ripper.
  99. * [Generating Wordlists](
  100. * [Creating Wordlists with Crunch](
  101. * [OMEN: Ordered Markov ENumerator](
  102. * OMEN is a Markov model-based password guesser written in C. It generates password candidates according to their occurrence probabilities, i.e., it outputs most likely passwords first. OMEN significantly improves guessing speed over existing proposals. If you are interested in the details on how OMEN improves on existing Markov model-based password guessing approaches, please refer to OMEN: Faster Password Guessing Using an Ordered Markov Enumerator.
  103. * [ - Common User Passwords Profiler](
  104. * The most common form of authentication is the combination of a username and a password or passphrase. If both match values stored within a locally stored table, the user is authenticated for a connection. Password strength is a measure of the difficulty involved in guessing or breaking the password through cryptographic techniques or library-based automated testing of alternate values. A weak password might be very short or only use alphanumberic characters, making decryption simple. A weak password can also be one that is easily guessed by someone profiling the user, such as a birthday, nickname, address, name of a pet or relative, or a common word such as God, love, money or password. That is why CUPP has born, and it can be used in situations like legal penetration tests or forensic crime investigations.
  105. ### <a name="wordlists">Wordlists</a>
  106. * [Crackstation�s Password Cracking Dictionary 1.5b words](
  107. * HIGHLY recommended
  108. * [WPA/WPA2 Dictionaries](
  109. * [SkullSecurity Password lists](
  110. * [Crack Me if You Can - Defcon 2010](
  111. * [Probable-Wordlists](
  112. * Wordlists sorted by probability originally created for password generation and testing
  113. * [BEWGor](
  114. * Bull's Eye Wordlist Generator
  115. * [SecLists](
  116. * [statistically-likely-usernames](
  117. * This resource contains wordlists for creating statistically likely usernames for use in username-enumeration, simulated password-attacks and other security testing tasks.
  118. ### Talks & Presentations
  119. * [Cracking Corporate Passwords Exploiting Password Policy Weaknesses - Minga Rick Redm - Derbycon3](
  120. ### <a name="papers">Papers</a>
  121. * [Optimizing computation of Hash Algorithms as an attacker](
  122. * [Attacking NTLM with Precomputed Hashtables](
  123. * Breaking encrypted passwords has been of interest to hackers for a long time, and protecting them has always been one of the biggest security problems operating systems have faced, with Microsoft's Windows being no exception. Due to errors in the design of the password encryption scheme, especially in the LanMan(LM) scheme, Windows has a bad track in this field of information security. Especially in the last couple of years, where the outdated DES encryption algorithm that LanMan is based on faced more and more processing power in the average household, combined with ever increasing harddisk size, made it crystal clear that LanMan nowadays is not just outdated, but even antiquated.
  124. * [Website Dedicated to Password Research](
  125. * A core objective of the Password Research Institute is to improve the industry awareness of existing authentication research. Many valuable solutions for the problems associated with authentication have gone unnoticed by the people interested in, or responsible for, authentication security. This project will compile and share a comprehensive, but moderated, index of password and authentication related research papers. We aim to share the details of useful papers, provide access to the papers, and encourage collaboration between authors and other security professionals.
  126. * [When Privacy meets Security: Leveraging personal information for password cracking - M. D�rmuth,A. ChaabaneD. Perito,C. Castelluccia]()
  127. * Passwords are widely used for user authentication and, de- spite their weaknesses, will likely remain in use in the fore seeable future. Human-generated passwords typically have a rich structure , which makes them susceptible to guessing attacks. In this paper, we stud y the effectiveness of guessing attacks based on Markov models. Our contrib utions are two-fold. First, we propose a novel password cracker based o n Markov models, which builds upon and extends ideas used by Narayana n and Shmatikov (CCS 2005). In extensive experiments we show that it can crack up to 69% of passwords at 10 billion guesses, more than a ll probabilistic password crackers we compared against. Second, we systematically analyze the idea that additional personal informatio n about a user helps in speeding up password guessing. We find that, on avera ge and by carefully choosing parameters, we can guess up to 5% more pas swords, especially when the number of attempts is low. Furthermore, we show that the gain can go up to 30% for passwords that are actually b ased on personal attributes. These passwords are clearly weaker an d should be avoided. Our cracker could be used by an organization to detect and reject them. To the best of our knowledge, we are the first to syst ematically study the relationship between chosen passwords and users� personal in- formation. We test and validate our results over a wide colle ction of leaked password databases.
  128. * [PassGAN](
  129. * This repository contains code for the [PassGAN: A Deep Learning Approach for Password Guessing paper]( The model from PassGAN is taken from [Improved Training of Wasserstein GANs]( and it is assumed that the authors of PassGAN used the [improved_wgan_training tensorflow]( implementation in their work. For this reason, I have modified that reference implementation in this repository to make it easy to train ( and sample ( from.