Passwords are the first line of defense — and the weakest. 81% of data breaches involve compromised credentials.
# Linux password hashes
cat /etc/shadow
# Windows SAM hashes (Meterpreter)
hashdump
# Database hashes
SELECT username, password FROM users;hashid 'e10adc3949ba59abbe56e057f20f883e'
# Output: MD5
hash-identifier
# Interactive hash identification# Basic wordlist attack
john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt
# With rules (mutations)
john --wordlist=rockyou.txt --rules hashes.txt
# Show cracked passwords
john --show hashes.txt# MD5
hashcat -m 0 hashes.txt rockyou.txt
# NTLM (Windows)
hashcat -m 1000 hashes.txt rockyou.txt
# WPA2
hashcat -m 22000 handshake.hc22000 rockyou.txt# Generate from website
cewl https://target.com -d 3 -m 6 -w custom_wordlist.txt
# Common Indian passwords to add
echo -e "password123\nadmin123\nqwerty\n123456789\ncompany_name2026" >> wordlist.txtSubscribe to ONLY4YOU and get hands-on access to 40+ premium courses — Ethical Hacking, Kali Linux, Metasploit, Network Hacking, Bug Bounty & more!