Cracking Files

Hunting for encoded files

Hunting for files

cry0l1t3@unixclient:~$ for ext in $(echo ".xls .xls* .xltx .csv .od* .doc .doc* .pdf .pot .pot* .pp*");do echo -e "\nFile extension: " $ext; find / -name *$ext 2>/dev/null | grep -v "lib\|fonts\|share\|core" ;done

Hunting for SSH Keys

cry0l1t3@unixclient:~$ grep -rnw "PRIVATE KEY" /* 2>/dev/null | grep ":1"
circle-info

If ssh key has Proc-Type: 4,ENCRYPTED, then we can't use that because it is password protected

Hunting for archives

Download all file extensions

$ curl -s https://fileinfo.com/filetypes/compressed | html2text | awk '{print tolower($1)}' | grep "\." | tee -a compressed_ext.txt

Cracking using john

Cracking SSH keys

$ ssh2john.py SSH.private > ssh.hash
$ john --wordlist=rockyou.txt ssh.hash
$ john ssh.hash --show

SSH.private:1234

1 password hash cracked, 0 left

Cracking Microsoft Office Documents

Cracking PDFs

Cracking ZIP

Cracking openssl encrypted archives

  • there will be lots of false positive and might also fail finding the correct password so we must use the openssl itself

Cracking bitlocker encrypted drives

Mounting .vhd

https://www.linuxuprising.com/2019/04/how-to-mount-bitlocker-encrypted.htmlarrow-up-right

Last updated