The calling
EasyCryptography
Overview
We've intercepted a secret letter. It reads as follows:
"Hello, My name is Alice bob, I was born on 2002, and I work at a company called secureit, I have a cute cat named charlie"
Beside the letter, we found this unique string: 6f43c1d96b72514eb3ff49e534d86333
Your Mission: Decipher the string to find the hidden password.
Flag Format: FLAG{password}
Lab Details
Prerequisites & Requirements
- Linux CLI & Environment: Ability to execute tools, manage files, and redirect output within a security-focused distribution (like Kali Linux or Parrot OS).
- Cryptography Fundamentals: Understanding the difference between encryption (two-way) and hashing (one-way).
- Social Engineering & Profiling: Familiarity with how attackers use Personally Identifiable Information (PII) to predict user behavior and password choices.
What will you learn?
- Hash Identification: Recognizing common cryptographic hash types (like MD5) based on their length, character set, and format.
- Targeted Wordlist Generation: Using the Common User Passwords Profiler (CUPP) to create a custom dictionary based on specific victim data rather than relying on generic lists.
- Automated Password Cracking: Configuring and running industry-standard cracking engines to brute-force hashes.
- Data Synthesis: Connecting fragmented pieces of information from a "secret letter" to form a coherent, targeted attack strategy.
Tools
- hashid / hash-identifier: Command-line utilities used to identify the algorithm used to generate a specific hash.
- CUPP: An interactive tool that generates a custom wordlist by asking questions about a target's life (names, dates, pets, etc.).
- Hashcat & John the Ripper (JtR): Extremely fast and versatile password recovery tools that utilize CPU or GPU power to brute-force hashes using wordlists.
Job Positions
Red Teamer
Tags
HashingMd5Brute ForcePassword Cracking