Skip to content

A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.

Notifications You must be signed in to change notification settings

sean-t-smith/Efficient_Corporate_Masks

 
 

Repository files navigation

Efficient_Corporate_Masks

Goal

To improve the efficiency of password cracking using hashcat mask attacks by prioritizing masks with the highest password cracking probability in the shortest possible time.

Background

Forked from the work of golem445 who compiled a list of 8-14 character Hashcat masks based on an analysis of 1.5 million NTLM hashes cracked during pentesting. I started using these lists, but quickly realized that it was taking a long time with my limited GPU cracking resources... I needed to re-order and efficiently prioritize the masks somehow. Luckily, golem445 included the "corp_8-14.statsgen" file which included the frequency that each mask in the data set was found. The frequency along with the mask gave me everything that I needed to prioritize each mask using an efficiency score rather than just by frequency. The efficiency score allowed me to prioritize masks with a higher probably of cracking the password in the shortest possible time.

Sorting Methodology

  1. Imported the "corp_8-14.statsgen" file into the MS Excel file: hcmask_Generator_9000.xlsx
  2. Separated the mask and frequency into different columns.
  3. Created a column that counted the total characters represented by each mask.
  4. Created a column that calculated the total keyspace of each mask.
  5. Created a column that assigned an efficiency score to each mask using the formula: (frequency / keyspace) * 1 Trillion
  6. Sorted the entire spreadsheet by the efficiency score.
  7. Created a mechanism to filter the spreadsheet by execution time based on your anticipated hashing speed.
  8. Filtered the spreadsheet by characters and exported the sorted masks into new "Efficient" .hcmask files.

Usage

The .hcmask files above describe passwords of differing character lenghts (8-14 characters), each sorted by efficiency, and formatted for use by the Hashcat password cracking tool. Depending on your situation, you might want to focus on passwords of a specific length only vs the entire set (Efficiency_8-14). The included spreadsheet has the analysis if you want to re-sort and generate your own hcmask file. Recognize that this type of brute force mask attack can take a long time and should be performed last after you have exhausted more targeted methods. My recommended password cracking attack order is below:

  1. Backup/Clear your hashcat potfile for the new set of hashes because mixing previous results gets confusing and if the potfile gets too large it can slow down the cracking process.
  2. Basic dictionary attack with your favorite wordlist... ie rockyou.txt
hashcat.exe -d <include_gpu_numbers> -m 1000 -w 4 -a 0 --session <name_your_session> <ntlm_hashes.txt> <rockyou.txt> -O
  1. Brute force all permutations 1-7 character length passwords... this does not take long given the minimal keyspace of this group.
hashcat.exe --increment --increment-min=1 -d <include_gpu_numbers> -m 1000 -w 4 -a 3 --session <name_your_session> <ntlm_hashes.txt> ?a?a?a?a?a?a?a -O
  1. Targeted dictionary attack... create a custom lowercase wordlist using CeWL and add local sports teams, city names, mascots, etc and apply the best64.rule
hashcat.exe -d <include_gpu_numbers> -m 1000 -w 4 -a 0 --session <name_your_session> <ntlm_hashes.txt> <custom_wordlist.txt> -r best64.rule -O
  1. Analyze the set of cracked passwords for potential patterns, run targeted attacks which reflect those patterns.
  2. BIG dictionary attack... run the passwords through the largest wordlist you have.
  3. Analyze any newly cracked passwords for potential patterns, run targeted attacks which reflect those patterns.
  4. Use this repository of work and run the "Efficient_#.hcmask" from this repo according to your needs.

Example Hashcat Command for Using the .hcmask to Crack NTLM Hashes

hashcat.exe -d <include_gpu_numbers> -m 1000 -w 4 -a 3 --session <name_your_session> <ntlm_hashes.txt> Efficient_8-14.hcmask -O --force --hwmon-disable

Extra flags that might be necessary to make Hashcat work on your system. NOTE: These are dangerous, and should only be used very rarely!

--force | Force Hashcat to stop bothering you and just crack the damn passwords.
--hwmon-disable | Hashcat will throttle based on temp readings... ignore this and go for broke!

About

A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.

Resources

Stars

Watchers

Forks

Packages

No packages published