The most popular and powerful tools such as Hashcat or John The Ripper used to be as default hash cracking tools. But to some unknown reasons neither hashcat no john couldn't crack simple Java Object hashcode function. And even a lot of instruments couldn't identify such type of hash. This is very strange because sometimes Java developers converts users passwords with simple hashcode function and pushes in to database which make dictionary attack reasonable. Also, if you don't want to pay to crack you hash on resources as Hashes.com you may use this tool for testing.
Hashcat: issue Java hashCode() Token Length Exception with Hex integer
- Clone the repository
- Change path to builds
cd java_hashcode_breaker/builds
- Run .jar file with options below
java -jar <current build vesion>.jar -h <provide hash here> -w <path to wordlist>
- You can add -v option for verbose output
java -jar <current build vesion>.jar -h <provide hash here> -w <path to wordlist> -v
- Happy cracking.
Without verbosity
With -v option