Problem

Solution

Upon connecting to this endpoint, we’re given a series of hashes which we must identify and crack. I like cats so Hashcat is my top choice :)

Hash 1

482c811da5d5b4bc6d497ffa98491e38

This first hash is 32 hexadecimal characters, which is 128 bits. The most popular 128-bit hash is MD5 (mode 0 in Hashcat), so let’s run it with the RockYou dataset:

hashcat -m 0 -a 0 ciphertext1 /usr/share/wordlists/rockyou.txt

Within moments, we find 482c811da5d5b4bc6d497ffa98491e38:password123. Entering password123 into the oracle takes us to the next hash.

Hash 2

b7a875fc1ea228b9061041b7cec4bd3c52ab3ce3

This next hash is 40 hexadecimal characters, or 192 bits. Very few hashes are of this length, SHA-1 (mode 100) being one of the most popular, so let’s try that:

hashcat -m 100 -a 0 ciphertext2 /usr/share/wordlists/rockyou.txt

Once again, the hash is cracked in moments: b7a875fc1ea228b9061041b7cec4bd3c52ab3ce3:letmein. Inputting letmein leads us to the final hash.

Hash 3

916e8c4f79b25028c9e467f1eb8eee6d6bbdff965f9928310ad30a8d88697745

The final hash is 64 characters, or 256 bits. SHA-256 (mode 1400) is the most common. Once again:

hashcat -m 1400 -a 0 ciphertext3 /usr/share/wordlists/rockyou.txt

And similarly, we find 916e8c4f79b25028c9e467f1eb8eee6d6bbdff965f9928310ad30a8d88697745:qwerty098. After submitting qwerty098, we are given the flag.