🔍
01
Target
Recon
Identify system
The hash algorithm is the single biggest factor in attack feasibility. MD5 at 350GH/s vs bcrypt at 184KH/s is a 1.9-million-fold difference. Attackers probe for the hash type via error messages, service banners, or the format of any exposed hashes before investing GPU time.
→
💾
02
Hash
Acquisition
Obtain password DB
NTDS.dit - the Active Directory database - contains the hashed passwords for every domain account. It can be extracted via volume shadow copy, ntdsutil, or secretsdump.py, and cracked entirely offline. On a domain of 5,000 users with typical password hygiene, expect 70%+ recovery within 24 hours.
→
📖
03
Wordlist
Selection
Curate dictionary
CeWL (Custom Word List generator) scrapes any website and generates a vocabulary from its content. For a targeted corporate attack, scraping the company website, LinkedIn page, and press releases generates hundreds of domain-specific candidates (product names, project codenames, executive surnames) that generic wordlists miss entirely.
→
⚙️
04
Rule
Config
Mutation rules
"OneRuleToRuleThemAll" was reverse-engineered from millions of real cracked passwords to identify the 52,000 most common transformations humans actually apply. Using it, the word "summer" generates candidates including: Summer, summer1, Summer1!, $ummer, 5ummer, SUMMER, summer2024, Summer#1 - and 52,000 more variants.
→
⚡
05
Attack
Execution
GPU crack run
AWS p4d.24xlarge instances (8× A100 GPUs) can be rented for ~$32/hour and achieve speeds that dwarf most attackers' home rigs. The entire rockyou.txt wordlist with best64 rules runs in under 10 minutes on this hardware. Total crack cost for a typical enterprise database: under $200.
→
✅
06
Credential
Harvest
Collect plaintext
In real-world enterprise assessments, analysing the first 30% of cracked passwords typically reveals 2-3 organisation-specific patterns (company name, project names, seasonal cycles). Building targeted rules from these patterns consistently cracks an additional 20-30% of the remaining uncracked accounts in subsequent passes.
→
🚀
07
Access &
Pivot
Exploit & escalate
Pass-the-hash (PtH) attacks allow NTLM hashes to be used directly for authentication without cracking them at all - effectively bypassing the cracking step entirely for Windows lateral movement. This means even hashes that resist cracking can still be weaponised for network pivoting within an Active Directory environment.