Crack The Hash Level 2 Tryhackme Writeup 🎉
Crack with rockyou:
hashcat -m 1800 -a 0 hash4.txt rockyou.txt RockYou will crack this slowly but surely. Common password emerges: samsung .
Here’s a proper write-up for the room on TryHackMe. This level focuses on more complex hashes (non-MD5/NTLM) and requires using tools like hashcat , john , and online databases when needed. TryHackMe – Crack the Hash (Level 2) Write-up Task 1 – Get cracking Goal: Identify and crack each hash. Some are salted, some use key derivation functions. Hash 1 f09ed3e69444e2eaa2b258c7a612edf9c3efcbaa82289b419dcebea2e5c0fefc
hashcat -m 1400 hash3.txt rockyou.txt No result. Try SHA3-256? No – let's check length: 64 hex = 256-bit. crack the hash level 2 tryhackme writeup
64 hex → SHA256.
No salt mentioned. Try with hashcat (mode 1400 = SHA256) and RockYou:
Let's search online hash database (for CTF learning) – hash decoded as football . Crack with rockyou: hashcat -m 1800 -a 0 hash4
Length = 64 hex chars → SHA-256.
Looks like SHA256 again – but rockyou fails. Try online lookup – reveals: qwertyuiop
✅ Answer: letmein 4e1c6d31624d8eacfb7acf7b5e3de972ef8223e0a17f4c5b3aeeea60660f1e2e This level focuses on more complex hashes (non-MD5/NTLM)
hashcat -m 3200 -a 0 hash2.txt /usr/share/wordlists/rockyou.txt If too slow, try online lookup (but for CTF, guess password ? No – try letmein ).
✅ Answer: samsung a2b9071e2d0be36c14fcf2833ddf66ed49e6ccbd4ef4a01a7bf3e1cdb183df85
✅ Answer: trustno1 a7d6b3bde04955a00bfb63f14a8fbe4dc0161186e28c7e0c63b0d17c1b3aef4d