The calling

EasyCryptography

Overview

We've intercepted a secret letter. It reads as follows:

"Hello, My name is Alice bob, I was born on 2002, and I work at a company called secureit, I have a cute cat named charlie"

Beside the letter, we found this unique string: 6f43c1d96b72514eb3ff49e534d86333

Your Mission: Decipher the string to find the hidden password.

Flag Format: FLAG{password}

Lab Details

Prerequisites & Requirements

  • Linux CLI & Environment: Ability to execute tools, manage files, and redirect output within a security-focused distribution (like Kali Linux or Parrot OS).
  • Cryptography Fundamentals: Understanding the difference between encryption (two-way) and hashing (one-way).
  • Social Engineering & Profiling: Familiarity with how attackers use Personally Identifiable Information (PII) to predict user behavior and password choices.

What will you learn?

  • Hash Identification: Recognizing common cryptographic hash types (like MD5) based on their length, character set, and format.
  • Targeted Wordlist Generation: Using the Common User Passwords Profiler (CUPP) to create a custom dictionary based on specific victim data rather than relying on generic lists.
  • Automated Password Cracking: Configuring and running industry-standard cracking engines to brute-force hashes.
  • Data Synthesis: Connecting fragmented pieces of information from a "secret letter" to form a coherent, targeted attack strategy.

Tools

  • hashid / hash-identifier: Command-line utilities used to identify the algorithm used to generate a specific hash.
  • CUPP: An interactive tool that generates a custom wordlist by asking questions about a target's life (names, dates, pets, etc.).
  • Hashcat & John the Ripper (JtR): Extremely fast and versatile password recovery tools that utilize CPU or GPU power to brute-force hashes using wordlists.

Job Positions

Red Teamer

Tags

HashingMd5Brute ForcePassword Cracking