Crypto
Bruteforce
John
john --wordlist=/usr/share/wordlists/rockyou.txt hash.txtSql Hash
john -format=md5crypt-long --wordlist=/usr/share/wordlists/rockyou.txt hash.txtHashcat
Hash Identifier
hashid hash.txtDictionnary Attack
hashcat -m 500 hash.txt /usr/share/wordlists/rockyou.txtWordlist
crunch <minimum length> <maximum length> <charset> -t <pattern> -o wordlist.lstGPG / PGP
Buteforce
gpg2john private.key > hash.txt
john --wordlist=/usr/share/wordlists/rockyou.txt hash.txtDecrypt message
gpg -import private.key
gpg -d msg.txtIdentifier
Encode
Base64
echo lol | base64echo bG9sCg== | base64 -dUrlencode
urlencode "url_raw"urlencode -d "url_encode"Hexa
echo 6c6f6c0a | xxd -p -recho lol | xxd -p -rPFX
Bruteforce
crackpkcs12 -d /usr/share/wordlists/rockyou.txt certificate.pfxRSA
Common Modulus Attack
Condition:
Have 2 encrypt message
Have 2 public keys If you have this two condition you can found the original message with this program:
Git - RSA Common Modulus Attack
Xor
Basic calcul
a ^ b = c
a ^ c = bLast updated