How to use Graphcat to generate visual charts based on password cracking results

0 23
Since this tool is developed based on Python, we first need to install and confi...

How to use Graphcat to generate visual charts based on password cracking results

Since this tool is developed based on Python, we first need to install and configure the Python environment on the local device.

Next, researchers can use the following command to clone the source code of the project locally:

git clone https://github.com/Orange-Cyberdefense/graphcat

Then switch to the project directory and execute the installation command:

cd graphcat

pip install .

Tool help information

$ graphcat.py -h

usage: graphcat.py [-h] -potfile hashcat.potfile -hashfile hashfile.txt [-john] [-format FORMAT] [-export-charts] [-output-dir OUTPUT_DIR] [-debug]

 

Password Cracking Graph Reporting

 

options:

-h, --help          Display tool help information and exit

-potfile hashcat.potfile

Hashcat Potfile

-hashfile hashfile.txt

File path containing hashes (separated by lines)

-john               John potfile

-format FORMAT          Hash file format, 1 for hash; 2 for username; 3 for username:uid:lm:ntlm;

-export-charts           Generate PNG chart report

-output-dir OUTPUT_DIR

Output Directory

-debug              Enable debug mode

The tool is used

We need to use the -potfile parameter to provide a potfile for Graphcat, the default is hashcat, we can also use -john to provide a john potfile, or use -hashfile to provide a hash file:

$ graphcat.py -hashfile entreprise.local.ntds -potfile hashcat.pot

[-] Parsing potfile

[-] 164 entries in potfile

[-] Parsing hashfile

[-] 1600 entries in hashfile

[-] Generating graphs...

[-] Generating report...

[-] Report available at graphcat_1672941324.pdf

Data Format

Hash Only

aad3b435b51404eeaad3b435b51404ee

aad3b435b51404eeaad3b435b51404ee

aad3b435b51404eeaad3b435b51404ee

Username+Hash

test1:aad3b435b51404eeaad3b435b51404ee

test2:aad3b435b51404eeaad3b435b51404ee

test3:aad3b435b51404eeaad3b435b51404ee

Secretsdump

waza.local\test1:4268:aad3b435b51404eeaad3b435b51404ee:aad3b435b51404eeaad3b435b51404ee:::

waza.local\test2:4269:aad3b435b51404eeaad3b435b51404ee:aad3b435b51404eeaad3b435b51404ee:::

waza.local\test3:4270:aad3b435b51404eeaad3b435b51404ee:aad3b435b51404eeaad3b435b51404ee:::

If a hash appears more than once in the hash file, the tool will also perform multiple calculations on it.

In addition, if the secretsdump you provided contains password history, the tool will also analyze the similarity of the password history.

Tool Output Example

License Agreement

The development and release of this project followMITOpen Source License Agreement.

Project Address

Graphcat:【GitHub Gateway

你可能想看:

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

How to use Wavecrack in conjunction with hashcat to achieve password破解

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

Analysis of a Separated Storage and Computing Lakehouse Architecture Supporting Multi-Model Data Analysis Exploration (Part 1)

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

最后修改时间:
admin
上一篇 2025年03月29日 21:28
下一篇 2025年03月29日 21:51

评论已关闭