Password Cracking Challenge Writeup

This challenge had a bit of everything — from simple hash lookups to full-blown brute-force mask attacks. Here’s how I tackled it step by step.

1. Hash Conversion

We were given plaintext passwords and asked to convert them into hashes.

2. Crackstation + Hash Type Identification

We received unknown hashes from the Liber8tion group. Rockyou didn’t work, so I ran them through Crackstation and an online hash identifier.

Hashes.com type identifier Crackstation screenshot

3. Ophcrack (NTLM Hashes)

For NTLM hashes, I used Ophcrack with rainbow tables. All passwords were recovered successfully.

Ophcrack GUI screenshot

4. Crunch Time (Mask Attack)

This challenge gave us a format:

1 uppercase + 3 lowercase + 4-digit year (1980–2025) + 1 special character

I originally tried dictionary + year mask... mistake. The challenge name "Crunch Time" was the real hint — full mask was needed. (Shoutout Andy.)

hashcat -m 1000 -a 3 hashlist.txt -1 !@#$%^&*()-_=+[] ?u?l?l?l20?d?d?1

Eventually cracked with: Tmzt2025!

5. Combo Wordlist + MAC Address (Final)

Format was:

adjective-noun-last4MAC

I made a big mistake at first — tried to brute force word combos from scratch. That hit 50 GB fast. Ended up using a GitHub list of top adjectives/nouns and wrote a quick Python combiner.

Wordlist screenshot
hashcat -m 0 -a 6 hashlist.txt combined-hyphenated.lst -1 ABCDEF0123456789 ?1?1?1?1

Cracked them in no time.

Bonus Tools

Final Thoughts: Always read the challenge title. Don’t waste time wordlisting when the pattern is brute-forcible. And again: shoutout Andy 🫡