This is the write up for the room Hashing – Crypto 101 on Tryhackme and it is part of the complete beginners path

Make connection with VPN or use the attackbox on Tryhackme site to connect to the Tryhackme lab environment.

## Tasks Hashing – Crypto 101

**Task 1**

Read all that is in the task and press complete

**Task 2**

*2.1 What is the output size in bytes of the MD5 hash function?*

Answer: 16

** 2.2 Can you avoid hash collisions? (Yea/Nay**)

Answer: Nay

*2.3 If you have an 8 bit hash output, how many possible hashes are there?*

Took me a while to understand this. But here is a good explenation Hash Functions (nakamoto.com)

2 to the power of 8 = 256

Answer: 256

**Task 3**

*3.1 Crack the hash “d0199f51d2728db6011945145a1b607a” using the rainbow table manually.*

Go to Hash Type Identifier – Identify unknown hashes and put in the hash. The password will reveal itself

*3.2 Crack the hash “5b31f93c09ad1d065c0491b764d04933” using online tools*

Go to Hash Type Identifier – Identify unknown hashes and put in the hash. The password will reveal itself

*3.3 Should you encrypt passwords? Yea/Nay*

Answer: Nay

**Task 4:**

*4.1 How many rounds does sha512crypt ($6$) use by default?*

With a little bit of google I came accross this site that hold the answer Hashing passwords: SHA-512 can be stronger than bcrypt (by doing more rounds) – Michael Franzl

Answer ; 5000

*4.2 What’s the hashcat example hash (from the website) for Citrix Netscaler hashes?*

Open the example site from the text in the task example_hashes [hashcat wiki]. Look for the Citrix Netscaler. There are 2. The answer is the one that is not 512

**4.3 How long is a Windows NTLM hash, in characters?**

You can find the answer here example_hashes [hashcat wiki].

Answer 32

**Task 5**

*5.1 Crack this hash: $2a$06$7yoU3Ng8dHTXphAg913cyO6Bjs3K5lBnwq5FJyA6d01pMSrddr1ZG*

First we need to identify the hash by going to Hash Type Identifier – Identify unknown hashes

Now we need to find the right module for hashcat to use. Type in

hashcat -h | grep -iF "bcrypt"

We now know it is module 3200. Now let’s crack it by typing in

hashcat -m 3200 '$2a$06$7yoU3Ng8dHTXphAg913cyO6Bjs3K5lBnwq5FJyA6d01pMSrddr1ZG' /usr/share/wordlists/rockyou.txt

*5.2 Crack this hash: 9eb7ee7f551d2f0ac684981bd1f1e2fa4a37590199636753efe614d4db30e8e1*

First we need to identify the hash by going to Hash Type Identifier – Identify unknown hashes

And it already giving the password

**5.3 Crack this hash: $6$GQXVvW4EuM$ehD6jWiMsfNorxy5SINsgdlxmAEl3.yif0/c3NqzGLa0P.S7KRDYjycw5bnYkF5ZtB8wQy8KnskuWQS3Yr1wQ0**

First we need to identify the hash by going to Hash Type Identifier – Identify unknown hashes

Now we know it is sha512crypt we need to fin the correct module by typing in

hashcat -h | grep -iF "sha512crypt"

The module is 1800 . Now let’s start cracking by typing in

hashcat -m 1800 '$6$GQXVvW4EuM$ehD6jWiMsfNorxy5SINsgdlxmAEl3.yif0/c3NqzGLa0P.S7KRDYjycw5bnYkF5ZtB8wQy8KnskuWQS3Yr1wQ0' /usr/share/wordlists/rockyou.txt

The answer will reveal itself once hashcat is done

*5.4 Bored of this yet? Crack this hash: b6b0d451bbf6fed658659a9e7e5598fe*

First we need to identify the hash by going to Hash Type Identifier – Identify unknown hashes

and once we put in the hash the password is there as well. So no cracking needed