Has any one completed the SYO-701 lab Password Cracking 1.3 Challenge Exercise?

I am having trouble completing this lab on Password Cracking Challenge Exercise 1.3 since it seems to be the file is not correct or the instructions are not correct. I had followed the procedure as follows:

  1. Recon: wget -O htpasswd.txt http://psybrary.com/.htpasswd
  2. examine file: cat htpasswd.txt
  3. the file shown the username: hash
  4. idenfied the hash: hashid -m -e I had copied the hash only placed hereinstead of the <>.
  5. created a custom wordlist: cewl -w custom.txt http://psybrary.com/OurInspirations
  6. I had cat the custom.txt file and it was good.
  7. prepare the Attack Wordlist with the best64.rule: hashcat --stdout -r /usr/share/hashcat/rules/best64.rule custom.txt | uniq -u > new_wordlist.txt
    8.Cracking the password hash: hashcat -a 0 -m 1600 (this mode was selected since the hash had shown to be for an Apache MD5) htpasswd.txt new_wordlist.txt
  8. The process completed successfuly but couldnt crack the password hash.
    Has any one ran into this issue or is my procedure incorrect?

You went wrong at Step 5 in your list (cewl). You are aiming at the wrong page.

Thank you, When its a dictionary how do I know what were the mask used ?.?.?.?.

I figured it out on the mask. But you help on the actual solution I was having a problem with. Tank you JosephWhite

1 Like

thank you for your help.

1 Like