Skip to content

Examples

Thomas Perkins edited this page Jun 27, 2017 · 4 revisions

Verifying a hash type in Dagon

Verifying a hash type is pretty simple in Dagon, the hash will be run through some regular expressions and if a match is found it will output what was most likely used during the hashing phase: hash_verf

Dagon also provides an option for you to view all (as far as implemented) possible hashing algorithms used: hash_verf_all

Verifying a file full of hashes

Dagon also has the capability to verify a file full of hashes: Verify the most likely algorithm: hash_list Most and least likely algorithms: hash_list_least_like Verify the algorithm without being questioned: hash_list_batch

Cracking a hash without a wordlist

Dagon has the functionality to create it's own wordlists to use for cracking, if a wordlist is not passed as an argument, it will run a regular expression to verify that a wordlist has not been created already and attempt to create one. If for any reason Dagon runs out of mutations while creating the wordlist it will prompt you to either continue, or just use what was created. If you continue it will add +2 to the wordlist length and try again: wordlist_creation

Cracking a hash with a wordlist

If you would like to use your own wordlist, you can pass a wordlist to read from, Dagon will read from that wordlist in an attempt to crack the hashes:

wordlist_read

Cracking a file full of hashes

Dagon is capable of cracking a file full of hashes with automatic verification: crack_hash_list

You can also crack a file full of hashes without being questioned: crack_hash_list_batch

Downloading a wordlist

Dagon has the capability of downloading a wordlist for you, all you have to do is pass a flag and watch it download, it will even tell you how long it took to download the wordlist:

download download_done

Salting the passwords

There are many options to salt the passwords using Dagon. salt_manip

Random salts, you have the options to create random salts and add a random placement to the hash: rand_salt

Your own custom salt and placement, if you already know the salt that was created you can create your own and give it a placement, back or front:

custom_salt

Urandom salts, random uncode salting is used fairly often, so you can always create that as well: urandom_salt

Use just random characters as the salting, you can always give the option to use just random characters as the salt: char_salt

And of course you can also use a mixture of numbers and characters: int-char_salt

Timing the speed

Dagon allows you to see how fast it is trying to crack your hash by allowing you to run a benchmark test. It will start a clock and the second it stops it will stop the clock, then output the time it took for the process to finish: benchmark

Showing the available algorithms

Dagon provides a way to show you the available algorithms that have been implemented so far, it will also show you the identification number to use when specifying an algorithm: avail_algs

You can also display the algorithms in the process of being created: avail_algs_all

That's about all that Dagon is capable of as of now, for a full extensive break down on the flags and what they are capable of doing, please see the flags page here