Your objective for this lab is to thoroughly understand and utilize Hashcat. Begin by exploring the various components that make up Hashcat and understanding its behavior, including identifying where results are stored and other relevant details. Next, use Hashcat to crack a set of passwords provided on your Slingshot Linux VM, exploring the different operational modes of Hashcat. You will encounter a hash that cannot be cracked using the standard Dictionary mode with the provided wordlist. To address this, create a custom rules file that incorporates special characters with the words from the wordlist. Finally, extract a SHA-256 password hash from a Bitcoin wallet and crack the hash using Hashcat. This exercise will enhance your understanding of Hashcat’s components, modes, and custom rule creation for effective password cracking.
Â
Â
Not a member yet? Register now
Are you a member? Login now