Home Penetration Testing Tools Wavecrack – Web Interface For Password Cracking With Hashcat

Wavecrack – Web Interface For Password Cracking With Hashcat

189
0
SHARE

A user-friendly Web interface to share an hashcat cracking box among multiple users with some pre-defined options.

Screenshots

  • The homepage
  • Adding an hash to crack
  • Seeing the results and some stats

Outline
  • This Web application can be used to launch asynchronous password cracks with hashcat.
  • The interface tries to be as user-friendly as possible and facilitates the password cracking method choice and to automate the succession of various attack modes.
  • It also displays statistics regarding the cracked passwords and allows to export the cracked password list in CSV.
  • The application is designed to be used in a multi-user environment with a strict segregation between the cracking results of different users: the user authentication can be done through an LDAP directory or basic auth.

Usage
Wavecrack can be used to do the following:

  • Add new password hashes, choose the attack mode and the crack duration
  • View the past and current cracks for your user with statistics and graphs
  • View the overall load of the platform
  • Upload a password-protected file and extract its hash

The attack modes are followed in the order they are displayed on the hash submit form.
It is also possible to stop a crack. However, every cancelation is final.
A limit to the amount of concurrent cracks can be defined in the settings in order not to reduce the current cracks performance.

Requirements

Installation

  • Install the RabbitMQ server and

    python-ldap

    requirements

$ apt-get install libsasl2-dev libldap2-dev libssl-dev rabbitmq-server
$ pip install -r requirements.txt
  • Create a

    cracker/app_settings.py

    configuration file from the

    cracker/app_settings.py.example

    file and notably edit the

    Mandatory settings

    section:

    • The path of hashcat
    • The RabbitMQ connection string: by default, the guest/guest account is used. Be sure to harden your installation
    • The path of the SQLite database
    • The path of the hashcat rules
    • The path of the wordlists
    • The LDAP parameters:
      • IP address
      • port
      • LDAP database for the users
      • Base DN
  • Initialize the local database linked in the

    cracker/app_settings.py

    configuration file

$ sqlite3 base.db < base_schema.sql
  • Start the RabbitMQ server
$ sudo service rabbitmq-server start
  • Start Celery from the application folder
$ celery worker -A cracker.celery

Finally, if you don’t want to setup your own VM, you can use the Docker-based process described in the

docker

folder.

    LEAVE A REPLY

    Please enter your comment!
    Please enter your name here