LinuxCommandLibrary

rcrack

TLDR

Crack a single hash using rainbow tables

$ rcrack [path/to/tables] -h [5d41402abc4b2a76b9719d911017c592]
copy
Crack hashes from a file
$ rcrack [path/to/tables] -l [hashes.txt]
copy
Crack LM hashes from a pwdump file
$ rcrack [path/to/tables] -lm [pwdump.txt]
copy
Crack NTLM hashes from a pwdump file
$ rcrack [path/to/tables] -ntlm [pwdump.txt]
copy
Use multiple table directories
$ rcrack [tables1/] [tables2/] -h [hash]
copy

SYNOPSIS

rcrack tablepath [tablepath...] -h hash
rcrack tablepath -l hashfile
rcrack tablepath -lm pwdumpfile
rcrack tablepath -ntlm pwdumpfile

DESCRIPTION

rcrack is a rainbow table-based password cracker from the RainbowCrack project. It uses pre-computed tables to perform time-memory trade-off attacks, finding plaintext passwords from hash values much faster than brute-force methods.
Rainbow tables must be generated beforehand using rtgen and sorted with rtsort. The tables encode chains of hash computations that allow quick lookup of passwords matching a given hash. Table files have .rt or .rtc (compressed) extensions.
The tool is particularly effective against LM and NTLM hashes from Windows systems. LM hashes are split into two 7-character halves, making them especially vulnerable. NTLM is stronger but still susceptible to rainbow table attacks for common passwords.

PARAMETERS

-h HASH

Crack a single hash
-l FILE
Load hashes from file (one per line)
-lm FILE
Load LM hashes from pwdump file
-ntlm FILE
Load NTLM hashes from pwdump file
-t DIR
Rainbow tables directory
-o FILE
Write cracked passwords to output file
-p NUM
Number of threads to use
-s
Display cracking statistics
-u
Display username with cracked password

SUPPORTED ALGORITHMS

lm

LAN Manager hash (up to 7 characters)
ntlm
NT LAN Manager hash (up to 15 characters)
md5
MD5 hash (up to 15 characters)
sha1
SHA-1 hash (up to 20 characters)
sha256
SHA-256 hash (up to 20 characters)

CAVEATS

Rainbow tables require significant storage space (gigabytes to terabytes) and must match the hash algorithm and character set of the target passwords. Salted hashes cannot be cracked with rainbow tables. Modern password storage uses salting and slow hash functions (bcrypt, scrypt) specifically to defeat rainbow table attacks. Only use on systems you own or have authorization to test.

HISTORY

RainbowCrack was developed by Zhu Shuanglei (Philippe Oechslin's rainbow table concept) and first released around 2003. The project demonstrated the practical danger of unsalted password hashes and contributed to improved password storage practices. The tool showed that LM hashes could be cracked in minutes, leading to Microsoft deprecating LM hash storage in Windows Vista.

SEE ALSO

ophcrack(1), hashcat(1), john(1), rtgen(1)

Copied to clipboard