Back to BlogsKali Linux

Kali Linux Password Attacks — Crack Everything

Anuj Singh (Admin) 31 March 2026 396 views

Password Attacks with Kali Linux

Passwords are the first line of defense — and the weakest. 81% of data breaches involve compromised credentials.

Step 1: Get the Hashes

# Linux password hashes
cat /etc/shadow

# Windows SAM hashes (Meterpreter)
hashdump

# Database hashes
SELECT username, password FROM users;

Step 2: Identify Hash Type

hashid 'e10adc3949ba59abbe56e057f20f883e'
# Output: MD5

hash-identifier
# Interactive hash identification

Step 3: Crack with John

# Basic wordlist attack
john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt

# With rules (mutations)
john --wordlist=rockyou.txt --rules hashes.txt

# Show cracked passwords
john --show hashes.txt

Step 4: Crack with Hashcat (GPU)

# MD5
hashcat -m 0 hashes.txt rockyou.txt

# NTLM (Windows)
hashcat -m 1000 hashes.txt rockyou.txt

# WPA2
hashcat -m 22000 handshake.hc22000 rockyou.txt

Custom Wordlists

# Generate from website
cewl https://target.com -d 3 -m 6 -w custom_wordlist.txt

# Common Indian passwords to add
echo -e "password123\nadmin123\nqwerty\n123456789\ncompany_name2026" >> wordlist.txt

🔥 Master password attacks at ONLY4YOU →

Want to Learn This Practically?

Subscribe to ONLY4YOU and get hands-on access to 40+ premium courses — Ethical Hacking, Kali Linux, Metasploit, Network Hacking, Bug Bounty & more!