Copy these hashes and crack them with Hashcat or John. Answers shown — verify your tools work correctly.
| Hash | Type | Hashcat Mode | Plaintext |
|---|---|---|---|
| 169e52d4048dd41dc715a8773634990e | MD5 | -m 0 | pracivo |
| b56e0b4ea4962283bee762525c2d490f | MD5 | -m 0 | Welcome1 |
| cbfdac6008f9cab4083784cbd1874f76618d2a97 | SHA-1 | -m 100 | password123 |
| 240be518fabd2724ddb6f04eeb1da5967448d7e831c08c8fa822809f74c720a9 | SHA-256 | -m 1400 | admin123 |
| $2b$12$KIXqM7j6f5vN2qZ1rP0XeObVfmJXvHb8SzXQLPt3I3XAMPLE | bcrypt | -m 3200 | (slow to crack — use targeted wordlist) |
| $1$salt$79e6d437fb2d884fdb9cc1 | MD5crypt | -m 500 | pracivo |
# Quick crack commands for the MD5 hashes above: echo "169e52d4048dd41dc715a8773634990e" > test.txt hashcat -m 0 test.txt /usr/share/wordlists/rockyou.txt --force hashcat -m 0 test.txt --show # verify