Tempatnya Saling Berbagi

Sidebar Ads

Breaking

Friday, April 15, 2016

Cara Crack Password WP | Hahses


By default, WordPress password hashes are simply salted MD5 hashes. This is a piece of cake to crack by today’s security standards. hashcat is a great multi-threaded password hash cracker which can eat these hashes for dinner. I’ll show you how to crack WordPress password hashes!

1. First, install hashcat. In this example I am using Gentoo Linux which has hashcat available in portage, otherwise you can just download from the hashcat.net website.
Gentoo:
$ sudo emerge -av hashcat-bin

2. Next you will need to find a good dictionary or wordlist. An excellent wordlist is available from http://360percents.com/wordlist The English > Big Wordlist is good for starters. Download and unzip that wordlist. Note that most ‘serious’ hackers have their own wordlists which can be 10G or more in size.

3. Next, make a text file of the WordPress password hashes from the wp_user table from a WordPress database, each on a single line. For example, a file hash.txt could look like this:

$P$BjsWoVfZrkl13QryXsLRCEOomnoQpW0 
$P$BcSda3/tRXQcRZMPj3cUI0jZJFdMgL0 
$P$BNclJc4wbM.vSjKPYxKggDPtw3siXQ0 
$P$BdPnevgAM4xzttiTM3cRkwKcBUiDi5/ 
$P$BXepaVhs0UByWfkLcu62b6ONB5aTkF/ 
$P$BLxxnkSnCdIgKrzRvY4iGNWiDlEiMX.
$P$BgwpDDhzFKOrGHM5GmOqaEYpbZBApm/
$P$BNs8eOvBh2VwGmrvv1LCMUkXVp3dOS0
$P$BbOM8PaeWt2C0p4yBXma1SqXCiayR20
$P$BsxzJ5q0tp2fSbNyZwV4Y2kfP10li41
$P$B4UxiYkCiE849SisjMi80Wq1Q5QT9j.
$P$B77uJ.fF0CS9uXK1.WRY3prnpDSSGP.
$P$BYENdJJ9xjnO1Op4k3JaTMwa0eG4lt1
$P$BrxrMRnrUpU0CWl1mPxvrI5u90D1Gf/
$P$B0lALHh4n0FPChliDSaFc.1MT.rV6Q.
$P$BszaNsPu/kf6F7p6eDlRBISPmE8Bgu/
$P$B9fyhT.lw.uyjPvGrHJfsxylMGHOjX0
$P$BimzaP3WIOqO8edQwfPirHYUPomyaS/
$P$BPAl90Cin9RVTORHXf48PAN/NPX2be1
$P$B6hicNqHWfJw3xig14Zx4Yho4ycstr1
$P$BG3QbfGAl82SsroCXhhTiE7elitggz1
$P$B6QFSS8HR1ShgM2KXpY7qVGzboC3tf0
$P$Bb54FItDf4yrJ5u3Rjydsk6cuIdH9s/
$P$BSrIn.qn9YxycturSoJflmyaF8qk8X/
$P$Bff71tsrNjnXL.hU1wuxpnmNg9QyiI.
$P$BJOpY.sfGkwoMUdN5FJymo6wsjnkul/

4. Run hashcat-cli* –help
Running hashcat-cli32.bin –help will show options. Pay particular attention to the Hash types as well as Attack modes.

Crack away! 5. Now run hashcat as follows:
$ hashcat-cli32.bin -m[hash type] -a[attack mode] hashfile.txt wordlist.list
One example:
$ hashcat-cli32.bin -m400 -a4 /home/stmiller/hash.txt /home/stmiller/eng_alnum_big.lst

Warning: hashcat-cli32.bin is running from /opt/hashcat-bin so be careful of relative paths.
Initializing hashcat v0.44 by atom with 8 threads and 32mb segment-size...

Added hashes from file /home/stmiller/hash.txt: 1 (1 salts)
Activating quick-digest mode for single-hash with salt

NOTE: press enter for status-screen


Input.Mode: Dict (/home/stmiller/eng_alnum_big.lst)
Index.....: 1/1 (segment), 520644 (words), 8035785 (bytes)
Recovered.: 0/1 hashes, 0/1 salts
Speed/sec.: 4.28k plains, - words
Progress..: 17/520644 (0.00%)
Running...: 00:00:01:27
Estimated.: --:--:--:--


Input.Mode: Dict (/home/stmiller/eng_alnum_big.lst)
Index.....: 1/1 (segment), 520644 (words), 8035785 (bytes)
Recovered.: 0/1 hashes, 0/1 salts
Speed/sec.: 4.28k plains, - words
Progress..: 17/520644 (0.00%)
Running...: 00:00:01:29
Estimated.: --:--:--:--
Now go get some coffee!

For an easy hash to crack, this this: hash.txt = 85267b760313713f2e5d5fe11a83af03
$ hashcat-cli32.bin -m0 -a2 /home/stmiller/nobackup/wordlist/hash.txt /home/stmiller/nobackup/wordlist/Super-WPA 
Warning: hashcat-cli32.bin is running from /opt/hashcat-bin so be careful of relative paths.
Initializing hashcat v0.44 by atom with 8 threads and 32mb segment-size...

Added hashes from file /home/stmiller/nobackup/wordlist/hash.txt: 1 (1 salts)
Activating quick-digest mode for single-hash

NOTE: press enter for status-screen


Input.Mode: Dict (/home/stmiller/nobackup/wordlist/Super-WPA)
Index.....: 1/344 (segment), 3377508 (words), 33550344 (bytes)
Recovered.: 0/1 hashes, 0/1 salts
Speed/sec.: 1.74M plains, 427.26k words
Progress..: 470572/3377508 (13.93%)
Running...: 00:00:00:01
Estimated.: 00:00:00:06


Input.Mode: Dict (/home/stmiller/nobackup/wordlist/Super-WPA)
Index.....: 1/344 (segment), 3377508 (words), 33550344 (bytes)
Recovered.: 0/1 hashes, 0/1 salts
Speed/sec.: 1.25M plains, 9.42k words
Progress..: 3002901/3377508 (88.91%)
Running...: 00:00:05:19
Estimated.: 00:00:00:39


85267b760313713f2e5d5fe11a83af03:ladiesman
All hashes have been recovered
hashchat is multi-threaded so it works faster than johntheripper. A video card using oclhashcat-plus is even faster if you have an available high end video card. For a better wordlist, a few good ones are floating around on piratebay.

No comments:

Post a Comment

Recent Comments