Blog | G5 Cyber Security

Blowfish Password Cracking

TL;DR

This guide shows you how to crack a Blowfish-encrypted password using hashcat, a popular password cracking tool. It covers setting up hashcat, preparing your wordlist, and running the attack. Be aware that attempting to crack passwords without permission is illegal.

Prerequisites

Step-by-Step Guide

  1. Verify Hashcat Installation

    Open a terminal and run:

    hashcat --version

    This should display the hashcat version information. If it doesn’t, ensure hashcat is correctly installed and in your system’s PATH.

  2. Prepare Your Wordlist

    A good wordlist is crucial for success. You can:

    • Use a pre-made list: Download common password lists from the internet (e.g., RockYou.txt). Be aware of their size!
    • Generate your own: Use tools like cewl or crunch to create custom wordlists based on known information about the target. For example, using crunch:
      crunch 8 16 -d @/usr/share/wordlists/rockyou.txt | head -n 100 > my_wordlist.txt
    • Combine lists: Merge multiple wordlists to increase coverage.
  3. Determine the Blowfish Hash Type

    Hashcat needs to know the hash type. For standard Blowfish, it’s usually 3200. You can confirm this by searching online for your specific encryption program and its corresponding hash type.

  4. Run the Attack with Hashcat

    Use the following command to start cracking:

    hashcat -m 3200 hash.txt my_wordlist.txt
    • -m 3200: Specifies the Blowfish hash type.
    • hash.txt: The file containing your Blowfish hash. Replace with the actual filename.
    • my_wordlist.txt: The path to your wordlist. Replace with the actual filename.
  5. Monitor Progress

    Hashcat will display its progress in the terminal, showing the number of hashes cracked per second. It also shows estimated time remaining.

  6. Check Results

    If a password is found, Hashcat will output it to the terminal. It will also create a hashcat.potfile file containing the cracked passwords.

  7. Using Rules (Optional)

    Rules modify your wordlist by adding numbers, symbols, or capitalization variations. This can significantly increase your chances of success.

    hashcat -m 3200 hash.txt my_wordlist.txt -r rules/best64.rule
    • -r rules/best64.rule: Applies the ‘best64’ rule set to your wordlist. Hashcat includes many pre-defined rule sets in its rules/ directory.

Important Considerations

Exit mobile version