🥷
Hacksheet
  • README
  • scripts
  • wiki
    • BlockChain
    • Cloud
    • Crypto
    • Database
    • Extensions
    • Index
    • Javascript
    • Linux
    • Network
    • OSINT
    • Others
    • Port
    • Python
    • ReverseEngineering
    • Stego
    • Web
    • Windows
Powered by GitBook
On this page
  • Bruteforce
  • John
  • Hashcat
  • Wordlist
  • GPG / PGP
  • Identifier
  • Encode
  • PFX
  • RSA
  • Xor
  1. wiki

Crypto

PreviousCloudNextDatabase

Last updated 2 years ago


Bruteforce

John

john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt

Sql Hash

john -format=md5crypt-long --wordlist=/usr/share/wordlists/rockyou.txt hash.txt

Hashcat

Hash Identifier

hashid hash.txt

Dictionnary Attack

hashcat -m 500 hash.txt /usr/share/wordlists/rockyou.txt

Wordlist

crunch <minimum length> <maximum length> <charset> -t <pattern> -o wordlist.lst

GPG / PGP

Buteforce

gpg2john private.key > hash.txt
john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt

Decrypt message

gpg -import private.key
gpg -d msg.txt

Identifier

Encode

Base64

echo lol | base64
echo bG9sCg== | base64 -d

Urlencode

urlencode "url_raw"
urlencode -d "url_encode"

Hexa

echo 6c6f6c0a | xxd -p -r
echo lol | xxd -p -r

PFX

Bruteforce

crackpkcs12 -d /usr/share/wordlists/rockyou.txt certificate.pfx

RSA

Common Modulus Attack

Condition:

  • Have 2 encrypt message

  • Have 2 public keys If you have this two condition you can found the original message with this program:

Xor

Basic calcul

a ^ b = c
a ^ c = b

Hashcat Doc
Boxentriq
Source
Git - RSA Common Modulus Attack
Encode
GPG / PGP
Hashcat
Identifier
John
PFX
RSA
Wordlist
XOR