| 
		
	
	
	
		
	Posts: 12Threads: 2
 Joined: Jan 2021
 
	
	
		I have not used hashcat in a VERY long time, but I need it again. 
A game came out recently and it has a password system to input cheat codes. The community hasn't yet found all codes, but we have found them encrypted.
 
What we got: The game's code is open source, including the cheat system and encrypted passwords
The salt for the encryption is also visible (0L4rlK}{9ay6'VJS)
All encrypted passwords are 88 characters long and end in "==" (eg.:)Code: i5u5sIsMs5eITy+LzAXvKm6D9OzOVKhUqSy1mTTV/oUxJX6RPsk8OcyLbNaey9Vc6wXOhz+2+mTXILkIRzvXqA==
Some passwords use normal words; a dictionary attack is possible
The game lowercases any text input for the cheats, therefore all passwords lowercase (however, numbers and special characters are still used)
According to the game's code, the encryption does 2 passes.
 
What I need: Figure out what encryption this is (i think it's SHA, not sure)
Figure out how to use hashcat to crack the passwords, using the salt
 
Is this possible? if so, how? 
inb4 "using password cracking software to cheat at a game" 
in my defense, most of these passwords are stuff like unlocking characters and levels, or using big head mode (not kidding)
 
just for an example, the above hash is "squish it skew it"
 
final note, the "big head mode" hash is  Code: V+YkwthNUePKS7zs5uB90VwN6Jeqgl+1r663U5zSGOEIxAO6BoWipzZoxa5H//LM+5Ag9GIGRnEcLbU21hjGfQ==
 
	
	
	
		
	Posts: 12Threads: 2
 Joined: Jan 2021
 
	
	
		also also not naming the game itself, lest the devs take note. if need be however, I will post code
	 
	
	
	
		
	Posts: 215Threads: 0
 Joined: Nov 2017
 
	
	
		The algorithm is Argon2 with the params, "iterations 2, memory 8192, parallelism 1, hash length 64 bytes, type Argon2id". 
See for example your text "squish it skew it" encoded here: https://gchq.github.io/CyberChef/#recipe...XQ&oeol=VT 
Hashcat does not support Argon2 as far as I know, however online I see some "argon 2 crackers" such asĀ https://github.com/CyberKnight00/Argon2_Cracker 
The format you need to provide is "$argon2id$v=19$m=8192,t=2,p=1 $MEw0cmxLfXs5YXk2J1ZKUw $i5u5sIsMs5eITy+LzAXvKm6D9OzOVKhUqSy1mTTV/oUxJX6RPsk8OcyLbNaey9Vc6wXOhz+2+mTXILkIRzvXqA "
 
Green = relevant options 
Blue = base64 encoded salt (so "0L4rlK}{9ay6'VJS" turns into "MEw0cmxLfXs5YXk2J1ZKUw") 
Red = hash you want to crack, ('i5u5sIsMs5eITy+LzAXvKm6D9OzOVKhUqSy1mTTV/oUxJX6RPsk8OcyLbNaey9Vc6wXOhz+2+mTXILkIRzvXqA==' for 'squish it skew it')
	 
	
	
	
		
	Posts: 215Threads: 0
 Joined: Nov 2017
 
	
	
		remember to remove the last '==' when using the Argon2_Cracker, if you leave them at the end it will not find the word
	 
	
	
	
		
	Posts: 12Threads: 2
 Joined: Jan 2021
 
	
	
		 (04-30-2024, 09:09 AM)DanielG Wrote:  The algorithm is Argon2 with the params, "iterations 2, memory 8192, parallelism 1, hash length 64 bytes, type Argon2id".[...]
 
thanks for the tip, will test when possible
	 
	
	
	
		
	Posts: 12Threads: 2
 Joined: Jan 2021
 
	
		
		
		04-30-2024, 11:05 AM 
(This post was last modified: 04-30-2024, 11:05 AM by genen.)
		
	 
		Code: python crack_argon2.py -c '$argon2id$v=19$m=8192,t=2,p=1$MEw0cmxLfXs5YXk2J1ZKUw$i5u5sIsMs5eITy+LzAXvKm6D9OzOVKhUqSy1mTTV/oUxJX6RPsk8OcyLbNaey9Vc6wXOhz+2+mTXILkIRzvXq' -w './fasttrack.txt'Plain text not found !!!
i had to find a seperate dictionary file for fastrack.txt. it has all the words for the password but it won't output "squish it skew it"
	 
	
	
	
		
	Posts: 215Threads: 0
 Joined: Nov 2017
 
	
	
		You are missing the last letter in your hash, so yours ends in zvXq  in stead of zvXqA . Also is "squish it skew it" in the file fasttrack.txt? It can only successfully find passwords that are in your list.
 Code: > cat wordz.txtsquish it skew it
 
 > python3 crack_argon2.py -c '$argon2id$v=19$m=8192,t=2,p=1$MEw0cmxLfXs5YXk2J1ZKUw$i5u5sIsMs5eITy+LzAXvKm6D9OzOVKhUqSy1mTTV/oUxJX6RPsk8OcyLbNaey9Vc6wXOhz+2+mTXILkIRzvXqA' -w wordz.txt
 
 $argon2id$v=19$m=8192,t=2,p=1$MEw0cmxLfXs5YXk2J1ZKUw$i5u5sIsMs5eITy+LzAXvKm6D9OzOVKhUqSy1mTTV/oUxJX6RPsk8OcyLbNaey9Vc6wXOhz+2+mTXILkIRzvXqA -> squish it skew it
 
 Total time taken : 0.009251832962036133
 
	
	
	
		
	Posts: 215Threads: 0
 Joined: Nov 2017
 
	
	
		other words found for your open source game are: Code: WAJJ66pw2rSopXOuw4c4iKzIz3goKtivrv7b/THqYP8ev+E/sRn2LMXHqv8s+uzwMcVNoDxNn+AgG26xi+wgzg -> banana
 dSZpCST31Tu3rPJ4z18iR9Tcv+9Xi8/f7nQGplj2mvruy2A4CJJqZm1gzi6CQKl68pRXiNGUX0n4BI2LjaBcoA -> chaos zero 64
 
 aSk8dw6FzJtTEmovh8fVEtUBpu6lj3QlRT/B5lwiEhAw8dAhRBQLdvtYlPaQcZISWI4wneAfAo6w5d6uf5r++g -> sonic in paynt
 
 zYCIZw2qcnUbtF0P2ybLNHajdl8zrje0hzGex7yuMFe7fj4mvx4AegoMmvir28YvAbfAqkz/ekQRzr+RhrycHw -> creature capture
 
 u/Svaf+DCnCpJ8xmP3AVP4CK6X6X4O3fY73cmIq88ZJEygwz+n+L66q4Vhlv13vWgld1PEyRszFErzflQt9WZw -> cartridge tilt
 
 MohmPqpaGSd3MEHLfQKUFl/Yg8pHE+12X1LHEP59Gs/5w1u8mPtGUXNv1GYTF+c8gQqT5hXpZ3FeZ/EfCxo34g -> rouge's gallery
 
 dZgxKNagOtB9F7wXqUUPzsuq4tfQlfK8ZqEeFXdI3Hd+k5tYfRm3ToLgbqawaNmwuLVrJ8PB+QnH4gT3ojnTMw -> play it loud
 
 mFu5OB9d6jnc2kth7HE66wJ42F/GHDzSvuciK1Qw++6iGnpBccxcKjpoxgOvD3eIoqR606ruBINuXi23proXHQ -> juicebox
 
 MKjOtEFLkgXf21uiECdBTU6XtbkuFWaGh7i8znKo7JrXXEDrCBJmGwINvPg0T3TLn0zlscLvmC5nve7I+NTrnA -> speed demon
Other forums on the internet have found these apparently.
	 
	
	
	
		
	Posts: 12Threads: 2
 Joined: Jan 2021
 
	
	
		 (04-30-2024, 11:38 AM)DanielG Wrote:  You are missing the last letter in your hash, so yours ends in zvXq in stead of zvXqA. Also is "squish it skew it" in the file fasttrack.txt? It can only successfully find passwords that are in your list. 
The program didn't come with fasttrack.txt and since I'm using windows, I thought I had to find some other dictionary list. I found one that did have all those words separately. I also found another Argon2 cracker.https://github.com/p0dalirius/Argon2Cracker
 
As for some codes already being known, the devs leaked some on purpose, to help people who didn't want the grind.
	 
	
	
	
		
	Posts: 12Threads: 2
 Joined: Jan 2021
 
	
	
		 (04-30-2024, 11:41 AM)DanielG Wrote:  Code: WAJJ66pw2rSopXOuw4c4iKzIz3goKtivrv7b/THqYP8ev+E/sRn2LMXHqv8s+uzwMcVNoDxNn+AgG26xi+wgzg -> banana
 
Screw anonymity. Where'd you find "banana"?
	 |