Skip to main content

Posts

Showing posts from December, 2012

apt-get install CLI command for Cygwin

Installing a package using Linux CLI (Command Line Interface) like  " apt-get install " (Debian based) or " yum install " (Red-Hat based) is much more convenience that using GUI to install an tools or software and the like. It's automatically install and do everything you like and you just have to wait it to be complete and ready to run :) But for Windows user who wish to have a Linux environment on their Windows box they can install "Cygwin". With Cygwin you can run your Windows box like Linux, and it's kind like a hybrid "win-nix". Cygwin Logo If you forgot to select and install the necessary package that you wanted to some command will be not available to run or it might pop-out an error message like "command not found" or "invalid command " Now, if you wish to run a command like a mention above " apt-get install ", you can download the code here  make the script executable using chmod and move

Malay-Word Bash Generator Script

Using curl & sed a utility command in Linux CLI (command line interface), we can grab all the word and save it into the txt files. Here are the code : #/bin/sh for w in {A..Z}; do curl http://ms.wiktionary.org/wiki/Wiktionary:Senarai_perkataan_$w | sed '/<li>/,/<\/li>/!d' | sed -e 's/<[^>]*>//g' | sed '/^$/d' | sed 's/, /\n/g' |  sed '/\[sunting/d' | sed '/<!--/,/<\-->/d' > $w.txt; echo "Counting Lines.."; wc -l $w.txt; echo "Appending File $w to ALL.txt"; cat $w.txt >> ALL.txt; done Open up your text editor nano, vim or whatever text editor you like. Paste the code and save it. Not to forget, make the file executable using "chmod +x yourfilename.sh" That's it!
Using Hash Identifier to identify the hash before send to JTR (John The Ripper) Download it here ! This tool might save you a lot time to identifier the hash that you wish to be crack. Go luck and Happy Cracking!

Know your HASH

DES(Unix) Example: IvS7aeT4NzQPM Used in Linux and other similar OS. Length: 13 characters. Description: The first two characters are the salt (random characters; in our example the salt is the string "Iv"), then there follows the actual hash. Notes: [1] [2] Domain Cached Credentials Example: Admin:b474d48cdfc4974d86ef4d24904cdd91 Used for caching passwords of Windows domain. Length: 16 bytes. Algorithm: MD4(MD4(Unicode($pass)).Unicode(strtolower($userna me))) Note: [1] MD5(Unix) Example: $1$12345678$XM4P3PrKBgKNnTaqG9P0T/ Used in Linux and other similar OS. Length: 34 characters. Description: The hash begins with the $1$ signature, then there goes the salt (up to 8 random characters; in our example the salt is the string "12345678"), then there goes one more $ character, followed by the actual hash. Algorithm: Actually that is a loop calling the MD5 algorithm 2000 times. Notes: [1] [2] MD5(APR) Example: $apr1$12345678$auQSX8Mvzt.tdBi4y6Xgj.