Even though cybersecurity is always changing, cracking passwords is still an important skill for security workers to have. “PassBreaker,” a command-line password cracking tool made in Python, is the best in its field and has many advanced features that make it easy to decode passwords.
This detailed guide goes over all of PassBreaker’s features, such as wordlist-based attacks and brute force methods. It also talks about how it can handle different hash algorithms with optional salt values. This guide was written for both new and experienced pentesters.
Its goal is to teach you how to use PassBreaker’s parallel processing and password difficulty evaluation features to improve your cybersecurity and ethical hacking skills. It’s important to remember that this tool is only meant to be used for teaching and moral purposes as we look into it. This shows how important responsible usage is in the world of digital security.
PassBreaker is a command-line password cracking tool developed in Python. It allows you to perform various password cracking techniques such as wordlist-based attacks and brute force attacks.
Features
- Wordlist-based password cracking
- Brute force password cracking
- Support for multiple hash algorithms
- Optional salt value
- Parallel processing option for faster cracking
- Password complexity evaluation
- Customizable minimum and maximum password length
- Customizable character set for brute force attacks
Installation
- Clone the repository:
git clone https://github.com/HalilDeniz/PassBreaker.git
Install the required dependencies:
pip install -r requirements.txt
Usage
python passbreaker.py <password_hash> <wordlist_file> [--algorithm]
Replace <password_hash>
with the target password hash and <wordlist_file>
with the path to the wordlist file containing potential passwords.
Options
--algorithm <algorithm>
: Specify the hash algorithm to use (e.g., md5, sha256, sha512).-s, --salt <salt>
: Specify a salt value to use.-p, --parallel
: Enable parallel processing for faster cracking.-c, --complexity
: Evaluate password complexity before cracking.-b, --brute-force
: Perform a brute force attack.--min-length <min_length>
: Set the minimum password length for brute force attacks.--max-length <max_length>
: Set the maximum password length for brute force attacks.--character-set <character_set>
: Set the character set to use for brute force attacks.
Elbette! İşte İngilizce olarak yazılmış başlık ve küçük bir bilgi ile daha fazla kullanım örneği:
Usage Examples
Wordlist-based Password Cracking
python passbreaker.py 5f4dcc3b5aa765d61d8327deb882cf99 passwords.txt --algorithm md5
This command attempts to crack the password with the hash value “5f4dcc3b5aa765d61d8327deb882cf99” using the MD5 algorithm and a wordlist from the “passwords.txt” file.
Brute Force Attack
python passbreaker.py 5f4dcc3b5aa765d61d8327deb882cf99 --brute-force --min-length 6 --max-length 8 --character-set abc123
This command performs a brute force attack to crack the password with the hash value “5f4dcc3b5aa765d61d8327deb882cf99” by trying all possible combinations of passwords with a length between 6 and 8 characters, using the character set “abc123”.
Password Complexity Evaluation
python passbreaker.py 5f4dcc3b5aa765d61d8327deb882cf99 passwords.txt --algorithm sha256 --complexity
This command evaluates the complexity of passwords in the “passwords.txt” file and attempts to crack the password with the hash value “5f4dcc3b5aa765d61d8327deb882cf99” using the SHA-256 algorithm. It only tries passwords that meet the complexity requirements.
Using Salt Value
python passbreaker.py 5f4dcc3b5aa765d61d8327deb882cf99 passwords.txt --algorithm md5 --salt mysalt123
This command uses a specific salt value (“mysalt123”) for the password cracking process. Salt is used to enhance the security of passwords.
Parallel Processing
python passbreaker.py 5f4dcc3b5aa765d61d8327deb882cf99 passwords.txt --algorithm sha512 --parallel
This command performs password cracking with parallel processing for faster cracking. It utilizes multiple processing cores, but it may consume more system resources.
These examples demonstrate different features and use cases of the “PassBreaker” password cracking tool. Users can customize the parameters based on their needs and goals.