picoCTF Cryptography Guide

here's how to solve hashcrack

Back to the Cryptography Guides

hashcrack

Name: hashcrack
Description: A company stored a secret message on a server which got breached due to the admin using weakly hashed passwords. Can you gain access to the secret stored within the server? Access the server using nc verbal-sleep.picoctf.net 51759
Author: Nana Ama Atombo-Sackey
Tags: Easy, Cryptography, picoCTF 2025, browser_webshell_solvable
Challenge from: picoCTF 2025
Hints:
1. Understanding hashes is very crucial. Read more here.
2. Can you identify the hash algorithm? Look carefully at the length and structure of each hash identified.
3. Tried using any hash cracking tools?

Theory

According to the description, to get the flag, I think we might have to crack hashes, and for that there is a really cool website called CrackStation, that has hashes of the most simple and popular passwords that exist, so I guess it's a good source we can have for this challenge. So yeah, that's about everything we can get from the challenge information, so let's go and enter to the NetCat.

Solution

Enter to the NetCat from the description:

shukularuni-picoctf@webshell:~$ nc verbal-sleep.picoctf.net 51759
Welcome!! Looking For the Secret?

We have identified a hash: 482c811da5d5b4bc6d497ffa98491e38
Enter the password for identified hash:

Great! An MD5 hash, let's send that to CrackStation and see what kind of password it is:

Enter the password for identified hash: password123
Correct! You've cracked the MD5 hash with no secret found!

Flag is yet to be revealed!! Crack this hash: b7a875fc1ea228b9061041b7cec4bd3c52ab3ce3
Enter the password for the identified hash:

Now that's SHA1, we don't have to change anything, as CrackStation already does that for us:

Enter the password for the identified hash: letmein
Correct! You've cracked the SHA-1 hash with no secret found!

Almost there!! Crack this hash: 916e8c4f79b25028c9e467f1eb8eee6d6bbdff965f9928310ad30a8d88697745
Enter the password for the identified hash:

Almost there? Alright let's finish this by sending the SHA256 to CrackStation:

Enter the password for the identified hash: qwerty098
Correct! You've cracked the SHA-256 hash with a secret found. 
The flag is: picoCTF{UseStr0nG_h@shEs_&PaSswDs!_ce730f64}

There we go! That's the flag.

I rated this level as "good"! :3


https://play.picoctf.org/practice/challenge/475