Claude-skill-registry crack-7z-hash
This skill provides guidance for cracking 7z archive password hashes. It should be used when tasks involve extracting hashes from password-protected 7z archives, selecting appropriate cracking tools, and recovering passwords through dictionary or brute-force attacks. Applicable to password recovery, security testing, and CTF challenges involving encrypted 7z files.
git clone https://github.com/majiayu000/claude-skill-registry
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/crack-7z-hash" ~/.claude/skills/majiayu000-claude-skill-registry-crack-7z-hash && rm -rf "$T"
skills/data/crack-7z-hash/SKILL.mdCrack 7z Hash
Overview
This skill guides agents through the process of extracting and cracking password hashes from 7z archives. It covers hash extraction, tool selection, attack methodology, and verification procedures essential for successful password recovery.
Workflow
Step 1: Hash Extraction
Before cracking, extract the hash from the 7z archive using appropriate tools.
Primary tool: 7z2john
# Locate 7z2john (usually part of john the ripper) locate 7z2john.pl # or find /usr -name "7z2john*" 2>/dev/null # Extract hash from archive 7z2john.pl archive.7z > hash.txt # or if using Python version 7z2john.py archive.7z > hash.txt
Verify hash extraction:
- The output should contain a hash string starting with
or similar format$7z$ - Check the hash file is not empty
- Confirm the hash format matches expected 7z encryption type
Common issues:
- Archive not encrypted: No hash will be extracted
- Corrupted archive: Extraction may fail
- Multiple encrypted files: May produce multiple hashes
Step 2: Hash Format Identification
Identify the hash type to select the correct cracking mode.
7z hash formats:
- 7z with AES-256 + SHA-256 (most common)$7z$0$
- 7z with older encryption$7z$1$
- 7z variant formats$7z$2$
Verify format compatibility:
# For hashcat, check supported modes hashcat --help | grep -i 7z # Mode 11600 = 7-Zip # For john, check format support john --list=formats | grep -i 7z
Step 3: Tool Selection and Configuration
Choose the appropriate cracking tool based on available resources.
Hashcat (GPU-accelerated, faster for large wordlists):
# Basic dictionary attack hashcat -m 11600 hash.txt wordlist.txt # With rules for password variations hashcat -m 11600 hash.txt wordlist.txt -r rules/best64.rule # Brute-force with mask (e.g., 6-8 lowercase letters) hashcat -m 11600 hash.txt -a 3 ?l?l?l?l?l?l?l?l --increment --increment-min 6
John the Ripper (CPU-based, good for varied attacks):
# Basic dictionary attack john --wordlist=wordlist.txt hash.txt # With rules john --wordlist=wordlist.txt --rules hash.txt # Incremental mode john --incremental hash.txt
Step 4: Wordlist Selection
Choose appropriate wordlists based on the context.
Common wordlists:
- General passwords/usr/share/wordlists/rockyou.txt
- Various password lists/usr/share/seclists/Passwords/- Custom wordlists based on context (usernames, dates, etc.)
Wordlist strategies:
- Start with common password lists (rockyou, common-passwords)
- Try context-specific wordlists if available
- Use rules to generate variations
- Fall back to brute-force for short passwords
Step 5: Execute Cracking Attack
Run the selected tool and monitor progress.
Monitor and document:
- Record the command used
- Note the start time
- Monitor progress/speed
- Capture any errors or warnings
Example session with hashcat:
# Start attack with status updates hashcat -m 11600 hash.txt wordlist.txt --status --status-timer=60 # Check status during run hashcat -m 11600 hash.txt --status # Show cracked passwords hashcat -m 11600 hash.txt --show
Step 6: Verification
CRITICAL: Always verify the cracked password works.
# Test with 7z command 7z t -p"recovered_password" archive.7z # Or extract to verify 7z x -p"recovered_password" archive.7z -o./extracted/
Verification checklist:
- Password successfully extracted from cracking tool output
- Password tested against original archive
- Archive contents successfully accessed
- Document the working password
Common Pitfalls
Incomplete Documentation
Always document each step:
- Commands executed
- Tool outputs
- Errors encountered
- Final results
Skipping Verification
Never assume a cracked hash means success. The password must be verified against the actual archive.
Wrong Hash Mode
Ensure the hash mode matches the 7z encryption type. Mode 11600 is standard but verify format.
Resource Exhaustion
Long-running attacks can consume significant resources:
- Monitor CPU/GPU usage
- Use
flag to save progress--session - Consider time limits for bounded tasks
Missing Dependencies
Verify tools are installed before starting:
which hashcat john 7z 7z2john.pl
Verification Strategies
- Hash Validity Check: Ensure extracted hash matches expected format
- Tool Compatibility Check: Verify cracking tool recognizes the hash
- Password Verification: Test recovered password against archive
- Content Verification: Confirm archive contents are accessible
Output Requirements
A successful completion should document:
- The extracted hash (or confirmation of extraction)
- The tool and method used
- The recovered password
- Verification that the password works
- Any relevant errors or warnings encountered