Tryhackme Writeup: Crack The Hash Level 2
hashcat -m 1400 -a 0 hash1.txt /usr/share/wordlists/rockyou.txt f09ed3... : password
$6$ prefix → SHA512crypt (Unix). Format: $6$salt$hash . Mode = 1800 in hashcat.
Let's search online hash database (for CTF learning) – hash decoded as football .
✅ Answer: trustno1 a7d6b3bde04955a00bfb63f14a8fbe4dc0161186e28c7e0c63b0d17c1b3aef4d crack the hash level 2 tryhackme writeup
64 hex → SHA256.
Here’s a proper write-up for the room on TryHackMe. This level focuses on more complex hashes (non-MD5/NTLM) and requires using tools like hashcat , john , and online databases when needed. TryHackMe – Crack the Hash (Level 2) Write-up Task 1 – Get cracking Goal: Identify and crack each hash. Some are salted, some use key derivation functions. Hash 1 f09ed3e69444e2eaa2b258c7a612edf9c3efcbaa82289b419dcebea2e5c0fefc
hashcat -m 1800 -a 0 hash4.txt rockyou.txt RockYou will crack this slowly but surely. Common password emerges: samsung . hashcat -m 1400 -a 0 hash1
✅ Answer: qwertyuiop $2y$10$V/MwRki7N9pGzXkSXjs6XeEwjf0B2P/i/g9s1gYpK3dKXzOaDlxTi
Length = 64 hex chars → SHA-256.
$2a$ prefix → bcrypt (hashcat mode 3200). Salt length 22 chars, total 60 chars. Mode = 1800 in hashcat
✅ Answer: letmein 4e1c6d31624d8eacfb7acf7b5e3de972ef8223e0a17f4c5b3aeeea60660f1e2e
Would you like a version with exact hashcat commands and flags explained for each hash type?
64 hex chars → SHA-256 again? Possibly HMAC? Try standard SHA256 first.
Crack with rockyou:
hashcat -m 1400 hash5.txt rockyou.txt Finds: trustno1