Hashing - Crypto 101
An introduction to Hashing, as part of a series on crypto
This room in the TryHackMe teaches about the basics of hashes. It's a walkthrough, so most of the process is included in the room. But I would like to share my findings and additional stuff related to this room.
Task 1:
The purpose of encoding is to transform data so that it can be properly (and safely) consumed by a different type of system. The purpose of encryption is to transform data in order to keep it secret from others. Read more

Task 2:
Output size of MD5 hash is 128 bit. 128 bit = 16 bytes. Because 1 byte = 8 bit.
Due to the pigeonhole effect, collisions are not avoidable
There are 2^8 possibles hashes. 2^8 = 256

Task 3:
This blog post is about the Rainbow Table Attack: Read
Online tools to crack hash. This will also tell you the hash type: Link
Password should be hashed. Encryption is not the correct term for that: Read more

Task 4:
SHA-rounds means the iteration of SHA function: Read more
Recommended website is enough to find the hash: Link. Check the image below to understand.


Task 5:
Hash analyser is an online tool: Link. The image below is the result of the first hash.

2. hashcat is kali tool to crack hash. 'bcrypt' hash code is 3200. Command: hashcat --help

3. Command to run hashcat:
hashcat -m 3200 [Hash saved file] [rockyou.txt file location]
Do not use --force
as it will generate false positive and false negative.
4. Crackstation.net can also crack some 'non-salted' hash. Try it too.

Task 6:

I hope this will help you. Thank you.
Last updated
Was this helpful?