Hash Cracker

DISCLAIMER

Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.  

Please ensure you are using the latest SD Card image which is available here.

 

Hardware Required

Component Number (Box Case)

Slot 1

Slot 11

Slot 11

Slot 2

Slot 11

Slot 11

Slot 12

Slot 13

Component

Raspberry Pi + Case 

USB Cable 

Kali SD Card 

TFT Screen 

HDMI Cable 

Keyboard 

Mouse 

Power Supply Unit 

 

Video Guide

 

Conclusion

You have probably found that some MD5 hashes will not be broken, why is that? When you use a brute force attack you are using a predefined word-list that has a finite number of results. If your password isn’t in one of these lists, then it can’t be broken. There are different ways to attack hashes, one way is called a rainbow table attack, where instead of attempting to decrypt the hash a list of hash values is compared to the target hash and then it is matched with its associated plaintext password. These kinds of attacks are usually reserved for newer hashing algorithms. The more complicated the password results in a more unique hash value and this will make decrypting these values a lot harder and require a lot of processing power and time to be able to attempt. This is why it is always encouraged to create strong passwords and you can do more research to see the advice about doing this.