Password dump: Difference between revisions
From Pessin randon wiki
Created page with "===Description=== Our username and password database was breached. Luckily all the passwords were hashed. *Different hashes - check image *Different hashes - check image *Different hashes - check image 70pts ===Question=== Would it still be possible to recover a password for some users? For the flag, post the recovered password ===Solution=== I recognised that it is probably an MD5 hash, which is crackable. However, I decided to try a crackstation website with a data..." |
No edit summary |
||
| Line 17: | Line 17: | ||
===Tools=== | ===Tools=== | ||
* Crackstation - | * Crackstation - [https://cracstation.net<nowiki>]</nowiki> | ||
===Flag=== | ===Flag=== | ||
<code>qwertyui</code> | <code>qwertyui</code> | ||
===Links=== | ===Links=== | ||
*[[CTF Challenges | Back to CTF Challenges page]] | *[[CTF Challenges | Back to CTF Challenges page]] | ||
Revision as of 11:03, 30 September 2022
Description
Our username and password database was breached.
Luckily all the passwords were hashed.
- Different hashes - check image
- Different hashes - check image
- Different hashes - check image
70pts
Question
Would it still be possible to recover a password for some users?
For the flag, post the recovered password
Solution
I recognised that it is probably an MD5 hash, which is crackable. However, I decided to try a crackstation website with a database of cracked hash keys. I entered the task keys until one key was cracked.
Tools
- Crackstation - [https://cracstation.net]
Flag
qwertyui