Hello all,
Hopefully this is an easy one for someone to assist me with. I am on the “Cracking Miscellaneous Files & Hashes” section of the Cracking Passwords with Hashcat module and am tasked with cracking the password for the password protected 7z file. The hint says to use 7z2john from /opt. I have tried to figure out the syntax for that tool, but there is nothing online, nor any help info for that file. Can someone provide me a hint on the syntax to extract the hash of a 7z file using 7z2john?
Thank you so much for the detailed response. Your instructions were spot on, however I did have to do a couple of extra things for them to work:
At the step where you use 7z2john to extract the hash and output to zipfile.johnhash
++ I received an error “Can’t locate Compress/Raw/Lzma.pm in @INC…”
++I had to run the command “sudo cpan IO::Compress::Lzma” and approve the prompt to auto configure
Because I am using the Pwnbox from the HTB Academy I used the Pwnbox path to rockyou.txt
++ /opt/useful/SecLists/Passwords/Leaked-Databases/rockyou.txt
++I also had to run the hashcat command for cracking the hash with sudo because Pwnbox likes to clamp down on permissions.
For those struggling with the Cracking Common Hashes section question * Crack the following hash: 7106812752615cdfe427e01b98cd4083*
The hint says to use hashid to identify the hash. That’s misleading because it says it’s an MD5 hash first, and other resources also identify it as an MD5 hash. It’s actually NTLM.
Hi. Don’t know if you’re still stuck on this, but try other rules. The hint of the exercise talks about Hashcat built-in rule sets. Try a few of them. Worked for me.