🔬
CTFs
  • 🚩nitrozeus's CTF Writeups
  • Tutorial
    • Install Windows 10 VM on M1 Mac
  • My Notes
    • Capture-The-Flag
      • Windows Forensics
      • Memory Forensics
      • Base32, Base64
      • Steganography
      • Email Analysis
      • Malware Analysis
      • MD4, MD5 Cracking
      • Social Engineering
      • OSINT
      • Google Dorking
      • Reconnaissance
      • Port Scan (nmap)
  • 2023
    • 🧠BrainHack CDDC 2023
      • Gallery
      • Eazy Network Analysis
      • What the hell happened to the PC?!
      • Audio Steganography
  • 2022
    • 🐱Grey Cat The Flag 2022
      • Parcel
      • Memory Game (Part 1)
      • Too Fast
      • Entry
      • Ghost
      • Firmware
      • Image Upload
      • flappy-js
    • ⛵STANDCON 2022
      • I Sea You (Part 1)
      • Locate Me
      • I Sea You (Part 2)
      • Trolley Trolling
      • A New Gateway
      • Walks like a cat, barks like a dog
      • Shark in the Ocean
      • Atlan Safe P1
      • Gift from Russia
      • Asmuth Shares
      • Memedump
      • Warmup Forensics
    • 🦁STACK the Flags 2022
      • Finding Nyan
      • New Task!
      • Hit you with that
      • Cobalt Struck
      • PyRunner
Powered by GitBook
On this page
  • Online Tools
  • Decrypt
  • Encrypt
  1. My Notes
  2. Capture-The-Flag

Base32, Base64

PreviousMemory ForensicsNextSteganography

Last updated 2 years ago

Online Tools

Decrypt

MD4

Place the MD4 hash into a file

echo -n '<md4-hash>' > hash.txt

Use (JTR) or to crack it

john --format=raw-md4 --wordlist=wordlist.txt hash.txt
# or
hashcat -m 900 -a 0 hash.txt wordlist.txt

MD5

Place the MD4 hash into a file

echo -n '<md5-hash>' > hash.txt

Use (JTR) or to crack it

john --format=raw-md5 --wordlist=wordlist.txt hash.txt
# or
hashcat -m 0 -a 0 hash.txt wordlist.txt

Encrypt

echo -n 'hello' | md5sum
md5sum sample.txt
MD5 Center
John The Ripper
Hashcat
John The Ripper
Hashcat