Date: 22, April, 2021
Author: Dhilip Sanjay S
Click Here to go to the TryHackMe room.
- Answer: easy
- Steps to Reproduce: Use any online hashcracker or hashcat 48bb6e862e54f2a795ffc4e541caed4d:easy
- Answer: password123
- Steps to Reproduce: Use any online hashcracker or hashcat cbfdac6008f9cab4083784cbd1874f76618d2a97:password123
- Answer: letmein
- Steps to Reproduce: Use any online hashcracker or hashcat 1c8bfe8f801d79745c4631d09fff36c82aa37fc4cce4fc946683d7b336b63032:letmein
- Answer: bleh
- Steps to Reproduce: Use hashcat $2y$12$Dwt1BZj6pcyc3Dy1FWZ5ieeUznr71EeNkJkUlypTsgbX1H68wsRom:bleh
- Answer: Eternity22
- Steps to Reproduce: Use any online hashcracker or hashcat 279412f945939ba78ce0758d3fd83daa:Eternity22
- Answer: paule
- Steps to Reproduce: Use Hashcat f09edcb1fcefc6dfb23dc3505a882655ff77375ed8aa2d1c13f640fccc2d0c85:paule
- Answer: n63umy8lkf4i
- Steps to Reproduce: Use Hashcat 1dfeca0c002ae40b8619ecf94819cc1b:n63umy8lkf4i
Hash: $6$aReallyHardSalt$6WKUTqzq.UQQmrm0p/T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02. Salt: aReallyHardSalt Rounds: 5
- Answer: waka99
- Steps to Reproduce: Use Hashcat sha512crypt (1800) 6$aReallyHardSalt$6WKUTqzq.UQQmrm0p/T7MPpMbGNnzXPMAXi4bJMl9be.cfi3/qxIf.hsGpS41BqMhSrHVXgMpdjS6xeKZAs02.:waka99
- Answer: 481616481616
- Steps to Reproduce: Use Hashcat HMAC-SHA1 e5d8870e5bdd26602cab8dbe07a942c8669e56d6:tryhackme:481616481616