1 00:00:00,590 --> 00:00:11,400 In previous, we have got the interim two version hash for the teaser from the responder, so we have 2 00:00:11,400 --> 00:00:13,040 this hash right now. 3 00:00:13,050 --> 00:00:16,490 We are going to crack this hash using the hashtag tool. 4 00:00:17,310 --> 00:00:26,360 So all you want to do is you need to download the sound file that is different from the hash tag. 5 00:00:27,010 --> 00:00:32,940 And you can see here, these are the qualifiers for the hash. 6 00:00:33,720 --> 00:00:39,900 Now you go to this hash cut down are going to just print the whole page and you can see these are the 7 00:00:39,900 --> 00:00:40,470 mods. 8 00:00:40,680 --> 00:00:44,870 We need to set the hash, get to, uh, crack the password. 9 00:00:44,880 --> 00:00:47,210 So these Mortada are good items. 10 00:00:47,680 --> 00:00:52,680 Now, since we are interested in and the album version to reconsider. 11 00:00:53,730 --> 00:00:59,260 And so we have got this interim version, too, here we can see the example. 12 00:00:59,280 --> 00:01:02,820 So this looks exactly like cover of hash. 13 00:01:02,850 --> 00:01:05,000 So this is the one we need. 14 00:01:05,010 --> 00:01:07,250 So the mode number is five six zero zero. 15 00:01:07,440 --> 00:01:13,970 So you need to remember this one five zero zero is for Washington and for what it is, five zero zero. 16 00:01:14,550 --> 00:01:15,060 All right. 17 00:01:15,060 --> 00:01:17,180 Now, let's open the CMB here. 18 00:01:18,890 --> 00:01:21,490 And now they want to seize her skirt. 19 00:01:22,930 --> 00:01:31,870 64 that Yuxi So so I'm using the 64 bit because my operating system is a bit and I want to specify this 20 00:01:31,870 --> 00:01:34,920 model using this plug and five six zero zero. 21 00:01:35,650 --> 00:01:40,240 And you need to pass this, uh, hash file here. 22 00:01:40,360 --> 00:01:43,330 That is this assembly and teller machine to. 23 00:01:45,260 --> 00:01:45,820 Sorry. 24 00:01:47,840 --> 00:01:55,130 So I am passing the file and I want to pass the wall this fall so you can use this rock. 25 00:01:57,470 --> 00:02:07,530 But that is one 100 per PNB when copying from guardedness to this machine, it has my laptop got hung. 26 00:02:07,880 --> 00:02:15,920 So that's why I just created these three passwords, because I know that password is just I'm just going 27 00:02:15,920 --> 00:02:21,890 to just test whether the hash that cracks the password for this test or not. 28 00:02:22,400 --> 00:02:23,280 So that's good. 29 00:02:23,330 --> 00:02:27,350 Well, let's see if Ashkenaz shows us the password as test or not. 30 00:02:27,620 --> 00:02:31,010 And you need to specify this or that. 31 00:02:31,270 --> 00:02:33,140 You guys private the regular. 32 00:02:33,980 --> 00:02:38,170 But I was unable to copy from Carita this year. 33 00:02:38,630 --> 00:02:45,710 So the reason I did not use the hashtag in the current is that virtual machine does not have this graphical 34 00:02:45,710 --> 00:02:51,730 spot and this Windows machine like main operating system, how this graphical server, how this Anuta 35 00:02:51,740 --> 00:02:56,210 914 makes not a great graphical, but not of my graphical. 36 00:02:56,240 --> 00:03:00,980 So this has got just this power of the graphics card to create this hashes. 37 00:03:01,340 --> 00:03:07,210 So if you have the more graphics card, it will crack that much faster. 38 00:03:08,470 --> 00:03:16,090 So they have said the Multiphasic 00 a.m. two, unless specified the hash extract and the word is just 39 00:03:16,540 --> 00:03:17,490 no return to. 40 00:03:21,570 --> 00:03:26,400 Now, you can see here there is one internal, uh, Deepu is currently broken. 41 00:03:26,430 --> 00:03:27,160 OK, fine. 42 00:03:27,390 --> 00:03:35,130 So it has been put this entire graphic, but I have this intel, so we have the graphic. 43 00:03:37,120 --> 00:03:42,780 And Maria disinviting 41, so I actually have a part for you show to spread of. 44 00:03:46,610 --> 00:03:48,830 So we need to say show. 45 00:03:54,030 --> 00:03:58,540 So as you can see, we have got the answer here and you can see at the end current. 46 00:03:59,130 --> 00:04:01,030 So this is our puzzle. 47 00:04:02,400 --> 00:04:08,070 So this is very simple because the password is very simple and it's not complex. 48 00:04:08,340 --> 00:04:14,070 So you can guess if the administrator is smart enough of these technologies are security mechanisms, 49 00:04:14,080 --> 00:04:16,020 then he might put the complex password. 50 00:04:16,200 --> 00:04:20,540 But he's a normal administrator who does not have that much about the security. 51 00:04:20,550 --> 00:04:25,390 Then he can keep those simple password and you can transfer the password cracking. 52 00:04:25,920 --> 00:04:32,820 So this will not work in either case, but it depends on the administrator or the user who gives the 53 00:04:32,820 --> 00:04:33,340 password. 54 00:04:33,450 --> 00:04:34,760 So that's all for this video. 55 00:04:34,780 --> 00:04:42,210 We have Krakatau and parent watching to hash with the hash, get a binary Ashker program.