[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Find your hash in online databases and retrieve its original value

License

Notifications You must be signed in to change notification settings

jackrendor/jhf-python

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Jack Hash Finder

Quick lookup for the original value of an hash

DEPRECATED

This repository is deprecated, go for the new version of jhf: https://github.com/jackrendor/jhf

Purpose

I was tired of looking up for common hashes values by hand. During CTFs you will eventually encounter some hashes. Instead of cracking them on your local machine or fire up a browser and look it up, the script does it for you. It tries some services to see if it's a common and known hash.

Supported hashes

Type Support
MySQL weak
NTLM weak
md5 strong
sha1 strong
sha256 strong
sha384 strong
sha512 strong

Video Demonstration

asciicast

Configure

Based on your distro, you should install first some dependencies.

Debian / Ubuntu

sudo apt install python3 python3-virtualenv

Fedora / RedHat

sudo dnf install python3 python3-virtualenv

Then simply execute the configure.sh file

bash configure.sh

or

./configure

Then you're ready to go. Simply execute the jhf file. You can pass the hash as argument:

./jhf 21232f297a57a5a743894a0e4a801fc3

You can specify more than one hash

./jhf b3ddbc502e307665f346cbd6e52cc10d 0bc11f2f3279555c317be9cf9e52645a

Or you can read from file by using -f or --file

./jhf -f report/hashes.txt
./jhf --file report/hashes.txt

No virtualenv

In case you don't want to use a virtual environment (which I discourage), install the python dependencies as user:

pip3 install --user -r ./requirements.txt

and DO NOT USE the jhf script. Just use the Python one:

python3 jhf.py