hashcat -m 3200 -a 0 hash2.txt /usr/share/wordlists/rockyou.txt If too slow, try online lookup (but for CTF, guess password ? No – try letmein ).
If no salt given, maybe it's an unsalted SHA256 with a less common password. crack the hash level 2 tryhackme writeup
hashcat -m 1800 -a 0 hash4.txt rockyou.txt RockYou will crack this slowly but surely. Common password emerges: samsung . hashcat -m 3200 -a 0 hash2
✅ Answer: letmein 4e1c6d31624d8eacfb7acf7b5e3de972ef8223e0a17f4c5b3aeeea60660f1e2e try online lookup (but for CTF
✅ Answer: trustno1 a7d6b3bde04955a00bfb63f14a8fbe4dc0161186e28c7e0c63b0d17c1b3aef4d
Looks like SHA256 again – but rockyou fails. Try online lookup – reveals: qwertyuiop
But room hint: Level 2 includes salted hashes. Try mode 1410 (SHA256 with salt appended).