Hashcat
Examples
JSON Web Tokens (JWT)
Eg. Cracking a JWT secret:
jwt.txt: entire JWT sequence (header, payload and signature) (eg.eyJhbGxxx.eyJ1c2xxx.gLYfqxxx)jwt.secrets.list: JWT secrets wordlist
$ hashcat -m 16500 -a 0 jwt.txt jwt.secrets.listFlags
-m/--hash-type: Hash type/modeEg.
-m 16500: Hash type of JWT (JSON Web Tokens)
-a: Attack modeEg.
-a 0: Dictionary attack
Possible wordlists
List of hash type/mode
13100
Kerberos 5, etype 23, TGS-REP (RC4-HMAC)
$krb5tgs$23$*<SERVICE_USERNAME>$<DOMAIN>$<SPN>@<DOMAIN>*$<HASH_VALUE>Notice the value 23 in the first section of the hash:
krb5tgs$23$, this refers to the etype 23
a. <SERVICE_USERNAME>: service account username
eg.
svc-user
b. <DOMAIN>: Domain
eg.
test.loc
c. <SPN>: Service Principal Name
eg.
http/mach.test.loc@test.loc
d. <HASH_VALUE>: Rest of the hash value
19600
Kerberos 5, etype 17, TGS-REP (AES128-CTS-HMAC-SHA1-96)
$krb5tgs$17$<SERVICE_USERNAME>$<DOMAIN>$<HASH_VALUE>Notice the value 17 in the first section of the hash:
krb5tgs$17$, this refers to the etype 17
19700
Kerberos 5, etype 18, TGS-REP (AES256-CTS-HMAC-SHA1-96)
$krb5tgs$18$<SERVICE_USERNAME>$<DOMAIN>$<HASH_VALUE>Notice the value 18 in the first section of the hash:
krb5tgs$18$, this refers to the etype 18
General documentation page
Last updated