2b5f5810c6 | ||
---|---|---|
img | ||
ntds | ||
.gitignore | ||
LICENSE | ||
README.md | ||
google_colab_hashcat.ipynb | ||
hashonymize.py |
README.md
Nephelees
Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also a NTDS cracking tool abusing Google Colab
Quick Start
- Open the
ipynb
file by clicking on the button Open in Colab - Select Runtime, Change runtime type, and set Hardware accelerator to GPU.
- Select Runtime" and Run all" !
- On your local machine, run hashonymize to anonymize your hash lists
- Upload your anonymized hashes list on the colab
!wget http://yourip:yourport/yourfile
or with the upload button - Install requirements (hashcat + wordlists + rules)
- Run hashcat commands
- Recover the .pot file from the Google Colab
!curl --upload-file ~/.hashcat/hashcat.potfile http://yourip:yourport/
or download the file from the explorer in the left side of the panel. - On your local machine, run the following hashcat command with the recovered potfile to match real usernames with cracked password
hashcat --potfile-path hashcat.potfile --hash-type 1000 --username example.ntds wordlists/rockyou.txt
⚠️ For every 12hrs or so Disk, RAM, VRAM, CPU cache etc data that is on our alloted virtual machine will get erased.
git clone https://github.com/iphelix/pack/blob/master/README $ python2 statsgen.py ../hashcat.potfile -o hashcat.mask $ python2 maskgen.py hashcat.mask --targettime 3600 --optindex -q -o hashcat_1H.hcmask
- markov, keyboard walking, dico + rules , haveibeenpwn
- reuse old pot (extract passwd to new wordlist)
Hashcat Cheatsheet
Here are some of the most used attack modes for the --attack-mode
option
0 Wordlist (with or without rules)
3 Pure bruteforce
Here are some of the most used hash types for the --hash-type
option
1000 NTLM (actually its for NT hashes)
3000 LM
5500 Net-NTLMv1 (actually, it should be called NTLMv1)
5600 Net-NTLMv2 (actually, it should be called NTLMv2)
13100 Kerberoast
18200 ASREProast
22000 WPA-PBKDF2-PMKID+EAPOL
16800 WPA-PMKID-PBKDF2
0 md5
100 sha1
1400 sha2-256
1700 sha2-512
Hashcat masks for custom cracking
References & Ideas
Most of the credits are due to @mxrch and @ShutdownRepo. This repository is mostly a rework of their scripts.
- https://github.com/mxrch/penglab
- https://github.com/ShutdownRepo/hashonymize
- https://github.com/ShutdownRepo/google-colab-hashcat
- https://github.com/carlmon/Hashcat-Azure
- https://durdle.com/2017/04/23/using-hashcat-to-crack-hashes-on-azure/
- https://www.trillsecurity.com/tutorials/automating-hashtopolis-with-terraform-part-i/
- https://www.trillsecurity.com/tutorials/automating-hashtopolis-with-terraform-part-ii/