Tags: crypto
Rating: 2.0
This was a simple SHA512 cracking challenge, basically we had a list of users with the respective password's hash using SHA512 (notice the hashes start with `$6`, which is the code the `crypt` function uses for SHA512). Within the given hash there was the salt used, so all that remained was to make a dictionary file with all the letters, as we guessed that the cipher used to encrypt the file was a simple substitution cipher, and crack each user's hash using that dictionary.
I was reading Violent Python a few weeks ago, and the first script they have you write is a MD5 cracking script for hashes in the `/etc/shadow` file, I had already modified it for SHA512 as it was an exercise in the book, so I just used that with slight changes.
You will find the script [here](https://github.com/arty-hlr/CTF-writeups/tree/master/2019/volga/shadow_cat).