My practice attempt to decrypt a SHA-256 hash of an IP address
#12
I didn't write that paste, just grabbed it because it did the job. Smile

Works for me:

Code:
# Get the masks file.
$ wget -O ip.masks https://pastebin.com/raw/4HQ6C8gG
[...]

# For efficiency, select the line from that we expect to match our candidate IP.
$ cat ip.masks.selected
01234,012345,123456789,2?1?d.2?1?d.?d.?3?d

# Make sure it's actually in the original masks file we downloaded.
$ fgrep -f ip.masks.selected ip.masks
01234,012345,123456789,2?1?d.2?1?d.?d.?3?d

# Get the MD5 of the target IP.
$ echo -n '211.231.4.57' | md5sum
e317a1a7ddb93c835fed61923522bc98  -

# Verify that that's in the target hash file.
$ cat 211.231.4.57.hash
e317a1a7ddb93c835fed61923522bc98

# Run hashcat. The hash is cracked with the expected mask which is included in the file.
$ hashcat --potfile-path=/dev/null --quiet -m 0 -a 3 211.231.4.57.hash ip.masks.selected
e317a1a7ddb93c835fed61923522bc98:211.231.4.57

Also, undeath - that mask file *does* allow for leading zeroes - all the ones with .?1?2 or .?2?1. (And those could be valid IPs in some circumstances.)
~


Messages In This Thread
RE: My practice attempt to decrypt a SHA-256 hash of an IP address - by royce - 02-27-2018, 05:25 PM