Skip to main content

Brute-Force Attack on MD5 Hash Using Hashcat

··280 words·2 mins· loading · loading ·
Brute-force Cyber-Security Hashcat MD5
UmmIt
Author
UmmIt
Loves to write about technology, and cybersecurity related topics :)
Table of Contents

Introduction
#

MD5 is a cryptographic hash function that produces a 128-bit hash value, and its one-way function. That means you can’t reverse the hash value to the original value. But you can break it using brute-force attack. In this article, I’ll guide you through the process of breaking an MD5 hash using Hashcat on Arch Linux or any other GNU/Linux distribution.

NOTICE: I’ll not cover any guide on OSX or windows. Use GNU/Linux instead.

Prerequisites
#

Before we start, you’ll need a wordlist for the brute-force attack. You can easily download a wordlist from the Arch User Repository (AUR) with the following command:

paru -S wordlists

The downloaded wordlists will be located at /usr/share/wordlists and will be about 2.1 GB in size.

Installing Hashcat
#

Install Hashcat from the official Arch Linux repository using the pacman command:

sudo pacman -S hashcat rocm-hip-sdk rocm-opencl-sdk

Using Hashcat
#

To begin the brute-force attack on the MD5 hash, use the following command:

hashcat -m 0 -a 0 -d 2 <value_of_md5> <wordlist_file>

This process may take some time, depending on the complexity of the hash and the size of your wordlist.

Once the process is complete, you can view the cracked value of the MD5 hash using:

hashcat -m 0 -a 0 <value_of_md5> --show

Advantages of Hashcat
#

Hashcat is particularly useful for batch processing multiple hash values. You can leverage the find command to automate the process for all hashes in a specified directory. For example:

find /usr/share/wordlists/ -type f -exec hashcat -m 0 -a 0 -d 2 hash {} \;

This command will execute Hashcat for each file in the specified directory, making it an efficient way to handle multiple hashes.

Related

How Hackers Break into Systems: Resetting Passwords Without the Old One
·502 words·3 mins· loading · loading
Ethical-hacking Cyber-Security Windows Password-reset
Brute-Force Attack with Aircrack-ng on WiFi Networks
··384 words·2 mins· loading · loading
Aircrack-ng high-school-article-rewrite Cyber-Security WiFi
How to install Packet Tracer on Arch Linux with AUR
·344 words·2 mins· loading · loading
Arch Linux Packet Tracer AUR
Hosting Forgejo Git System, Runner, and Action Testing
·514 words·3 mins· loading · loading
Forgejo Git
How to Backup Your GPG Key: A Step-by-Step Guide
·390 words·2 mins· loading · loading
GPG GNU/Linux
How to Set the Default Auto Load Seconds in GRUB
·114 words·1 min· loading · loading
grub Linux