- Cracking hashes
- Cracking encrypted files
- Reading Microsoft Compound Files and Office documents
- Catching creds in incoming auth requests
- Certificates and keys
- Identify hash type (here are some hash examples: https://hashcat.net/wiki/doku.php?id=example_hashes):
hash-identifier
- Crack a hash:
john ./hash --wordlist=/usr/share/wordlists/rockyou.txt
john ./hash --format=<format> --wordlist=/usr/share/wordlists/rockyou.txt
john --show ./hash
hashcat -m <hash_type> -a 0 ./hash /usr/share/wordlists/rockyou.txt
- Find
2john
converter for required file type:
locate *2john*
- Generate a hash:
<2john_converter> <some_document> > hash
- Crack it:
john ./hash --wordlist=/usr/share/wordlists/rockyou.txt
- Read using Apache OpenOffice.
- Analyze files using oletools: https://github.com/decalage2/oletools
- Responder supports many different protocols. Default usage example:
sudo responder -I tun0
- Convert
.ppk
keys to.pem
(a text-based container using base-64 encoding) or.key
:
puttygen my.ppk -O private-openssh -o my.pem
- Generate a public key:
puttygen my.ppk -O public-openssh -o my.pub
puttygen my.ppk -O public -o my.pub