WisdomEye Logo
WisdomEye

how to HACK a password // password cracking with Kali Linux and HashCat

Summary

This video provides a comprehensive guide to ethical password hacking and cracking, focusing on real-world techniques. Host Network Chuck demonstrates online brute-force attacks using Hydra and offline cracking using Hashcat against hashed passwords. It explains the core concepts of password hashing, salted hashes, and dictionary attacks. Through step-by-step demonstrations on Kali Linux, viewers learn how to use professional tools to identify vulnerabilities. The content emphasizes legalities, encouraging viewers to practice on their own systems or provided labs to develop cybersecurity skills while offering a practical hacking challenge to viewers.

Key Insights

The distinction between Online and Offline password attacks.

Online attacks involve automated login attempts against a live server using tools like Hydra. These are susceptible to firewalls, rate limiting, and account lockouts. Offline attacks involve obtaining a password hash (from a database or shadow file) and using tools like Hashcat on a local machine to guess the password without interacting with the target server, avoiding detection and external speed limits.

The Role of Hashing in Password Security.

Secure systems do not store passwords in plain text; instead, they use hashing algorithms like MD5, SHA-256, or NTLM to create a mathematical fingerprint. When a user logs in, the system hashes the input and compares it to the stored fingerprint. Cracking involves hashing words from a dictionary list until a match is found, as hashes are one-way functions that cannot be easily reversed mathematically.

The efficiency of Dictionary Attacks over Brute Force.

While pure brute force tries every possible character combination, dictionary attacks use lists of likely passwords, such as the famous RockYou list. This strategy is far more effective because people often choose common words or slight variations. Combining wordlists with rules or masks in tools like Hashcat further increases the likelihood of success against complex passwords.

Sections

Introduction and Manual Brute Forcing

Setting the hacking objective for the session.

The objective is to hack into the 'coffee server' assigned to the user Dwight Schrute to demonstrate real-world ethical hacking techniques.

Identifying the limitations of manual attempts.

Manual brute force attempts, such as sequentially trying numbers like 000001, are highly inefficient and impractical for any system requiring more than trivial effort.


Online Attacks with Hydra

Defining and implementing dictionary attack strategies.

Utilizing a list of common passwords rather than random characters significantly increases the efficiency and success rate of hacking attempts against live login prompts.

Overview of the RockYou password wordlist.

The RockYou password list, containing millions of actual passwords from a 2009 data breach, serves as a primary tool for security professionals and hackers.

Automating online attacks using the Hydra tool.

Hydra is a tool that automates the process of trying a wordlist against various network services like SSH, FTP, or Telnet on a live target.

Identifying risks and drawbacks of online attacks.

Continuous login attempts are noisy and easily detected by firewalls, often leading to IP bans or triggering account lockout security measures on the server.


Understanding Password Hashing

Defining hashing as a one-way mathematical function.

Hashing transforms a plain text password into a complex alphanumeric string using specific algorithms, ensuring the actual password remains hidden from direct view.

Locating password hashes in Linux environments.

In Linux systems, user password hashes are typically stored in the /etc/shadow file, which becomes a primary target for attackers seeking offline cracking targets.

The mechanism of system login verification.

Servers verify logins by hashing the password entered by the user and checking if the resulting hash matches the one stored in their database.


Offline Cracking with Hashcat

Introducing Hashcat as a high-speed cracking tool.

Hashcat is a powerful tool designed for offline password cracking, capable of processing millions of passwords per second by leveraging GPU processing power.

Explaining the logic of Hashcat straight attacks.

The straight attack mode in Hashcat involves taking every word from a dictionary file, hashing it, and comparing it to the target stolen hash.

Specifying hash types for different operating systems.

Different systems use different hash types; for example, Windows commonly uses NTLM (code 1000) while modern Linux systems often use SHA-512 (code 1800).

Impact of hardware on password cracking speed.

Using high-end hardware, specifically powerful GPUs, allows Hashcat to crack complex passwords significantly faster than a standard CPU-based approach owing to parallel processing.


Ethics and Practical Application

Legal and ethical boundaries of hacking tools.

Hashing and cracking tools must only be used with explicit permission or for educational purposes on personal labs to avoid illegal activity and prosecution.

Engaging the audience with a practical challenge.

The presenter challenges viewers to apply these skills on a specific test server to win coffee, reinforcing the learning through hands-on practical application.


Ask a Question

*Uses 1 Wisdom coin from your coin balance

Watch Video

Open in YouTube