Here we will generate hashes and then we will crack them just like if it was some stolen passwords.
This lab aime to build foundational knowledge in password security, improve technical documentation skills, and develop a structured approach to using cybersecurity tools effectively in both offensive and defensive contexts.
- Kali Linux
- Hashcat
- Tools to identify hash types based on format
- Tools to generate hashes
- rockyou.txt wordlist for dictionary attacks
- Generated hashes using multiple algorithms
- Identified hash types
- Cracking hashes
- Understood how salts affect hash uniqueness
- Improved Python one-liners and Linux commands
- Documented technical processes clearly and systematically
This project taught me how to identify and crack various hash types using Hashcat and other tools. Challenges included recognizing bcrypt hashes without reliable tool support and troubleshooting file and command formatting. I learned how salts protect passwords and improved both my Linux command skills and technical documentation.