🔑 Password Cracking Lab

PRACIVO LAB — INTENTIONALLY VULNERABLE
⚠️ Pracivo Security Lab — Hash identification, cracking techniques, Hashcat and John the Ripper guides.

Sample Hashes — Lab Practice

Copy these hashes and crack them with Hashcat or John. Answers shown — verify your tools work correctly.

HashTypeHashcat ModePlaintext
169e52d4048dd41dc715a8773634990eMD5-m 0pracivo
b56e0b4ea4962283bee762525c2d490fMD5-m 0Welcome1
cbfdac6008f9cab4083784cbd1874f76618d2a97SHA-1-m 100password123
240be518fabd2724ddb6f04eeb1da5967448d7e831c08c8fa822809f74c720a9SHA-256-m 1400admin123
$2b$12$KIXqM7j6f5vN2qZ1rP0XeObVfmJXvHb8SzXQLPt3I3XAMPLEbcrypt-m 3200(slow to crack — use targeted wordlist)
$1$salt$79e6d437fb2d884fdb9cc1MD5crypt-m 500pracivo
# Quick crack commands for the MD5 hashes above:
echo "169e52d4048dd41dc715a8773634990e" > test.txt
hashcat -m 0 test.txt /usr/share/wordlists/rockyou.txt --force
hashcat -m 0 test.txt --show  # verify