Skip to content

BokiCiphertext/Advanced-Password-Cracking-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Advanced Password Cracking & Hash Analysis πŸͺ¬πŸ”“πŸ”‘

Project Overview

: This lab demonstrates the practical application of password recovery techniques. I analyzed the performance differences between CPU-based dictionary attacks and hardware-accelerated brute-force (mask) attacks.

Phase 1: Dictionary Attack (John the Ripper)

: Using the world famous 'rockyou.txt' wordlist, I performed a targeted attack on an MD5 hash. John Success

Phase 2: Performance & Complexity Analysis

: I utilized Hashcat to push my hardware (Intel i5-12450H) to it's limits. At 217.8 MH/S "Million Hashes Per Second", the system estimated a 12-character brute-force attack would take 13 years, highlighting the exponential power of password length. Performance States

Phase 3: The "Quick Win" Mask Attack

: To demonstrate a successful recovery, I executed a 4-character mask attack ('?l?l?l?l'). Hashcat Command

Results

: The 4-character password "hack" was recovered in under 3 seconds. Cracked Success

Conclusion

: This project proves that short passwords offer zero protection against modern hardware. True security requires a combination of length, complexity and modern hashing algorithms like Argon2 or bcrypt.

About

A technical study of credential recovery using John the Ripper and hardware accelerated Hashcat.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published