CrackerJack is a web GUI for [[HashCat]] that is developed in Python using the Flask web application framework. Out of the box it is suitable for most tasks. It supports the following core attack modes: - [[HashCat#Dictionary Attacks|Wordlists]] - [[HashCat#Mask Attacks|Mask Attacks]] - [[HashCat#Brute Force Attacks|Brute Force]] The database provides reliable tracking of attacks and cracked hashes for session logging purposes. While this tool cannot match the power and flexibility of the command line utilities, it does provide quality of life improvements that may be desirable under certain circumstances. ![cj-session.png](https://github.com/ctxis/crackerjack/blob/master/screenshots/cj-session.png?raw=true) CrackerJack is deployed using ansible. It is highly recommended that you are familiar with ansible before attempting to launch/update CrackerJack. It is installed as a service and must be treated accordingly. To Update CrackerJack: ``` # Stop the web server. sudo systemctl stop crackerjack # Switch to the user that owns the files in the installation directory. This is usually the user running the web server. sudo -u www-data /bin/bash # Navigate to CrackerJack's install path. cd /opt/crackerjack # Pull the latest code. git checkout master git pull # Activate the virtual environment . venv/bin/activate # Install any requirements. pip install -r requirements.txt # Run flask migrations. If you get errors here, it means you are probably logged in as the wrong user. flask db migrate flask db upgrade # Restart service. Make sure you exit the `www-data` shell before you run this. sudo systemctl start crackerjack ``` [[Home]]