Upload your password-protected Private key file (often known as 'id_rsa')
Output:
Notes
- Uploaded files will be deleted immediately. We do NOT store your files.
- This site is using ssh2john from JohnTheRipper to extract and display the hash of the password that protects the private key file, which hashcat/john can then crack.
- Sample files to test the service can be dowloaded here or here.
How to use?
More than easy, just select and upload your Private Key SSH file. The hash will be computed in the "Output" part.
We support:
- OPENSSH: private key format for OpenSSH (ed25519 signatures), bcrypt PBKDF + AES-256-CBC
- AES-128-CBC
- AES-256-CBC
- AES-256-CTR
- AES-192-CBC
- DES-EDE3-CBC
- DSA
- EC
How to generate a public/private key pair / 'id_rsa' file
A public/private key pair can be generated with ssh-keygen:
user@box:~$ ssh-keygen
Generating public/private rsa key pair.
Enter file in which to save the key (/home/user/.ssh/id_rsa):
Created directory '/home/user/.ssh'.
We want our private key to be encrypted, let's enter a password at the prompt:Enter passphrase (empty for no passphrase): xxx
Enter same passphrase again: xxx
Your identification has been saved in /home/user/.ssh/id_rsa.
Your public key has been saved in /home/user/.ssh/id_rsa.pub.
In the folder ~/.ssh you now have two files : id_rsa and id_rsa.pub.
To recover the password previously typed, you need to:
1) Extract the hash from the private key file (id_rsa), this page will do it for you;
2) Give this hash to JohnTheRipper or Hashcat to start the crack.
One can also generate a private key thanks to openssl tool, example:
openssl genrsa -aes128 -passout pass:qwerty -out private.pem 2048
id_rsa file sample
This page accepts a file similar to:
-----BEGIN RSA PRIVATE KEY----- MIIEogIBAAKCAQEArFlurw0xLelRuT6ckwa+aV7IR8X+xDvHpE4vQ3kIIF5gg54O 7QVv8L87w/3JCTfS2dwV9yT4uEzGgcyGlNZDtCqUI0NQV28SZ7ARPMyFP2e6c5HR r/vbnTsl3JoEUjrtzbSCm1i52N7v1CYq9M/5bhEBXhDBBvUqvd+kNZW58SblnbsE UhpZWjI1l0IJQs5vfbNLl1GY9/WqmMizWraUGbr6RWYQEuL6KIxu6g6OEkX/AGLW Cnxt3JQNNNwxvPu002pU2EegZCk3UJB+q7548B+cgZ3spFG9f2i0KxOxXaXJZL4Z uKvRFBlx7CIYrzPM4+kNkBp5hZ675w5BTQKBHQIDAQABAoIBAHJqMItvU42qDcHP afxFBtVGwei77WRyVxehe8jsKVPrs2DM5hW9fVGyckerS/GdqJFOhRp75c3b0hBL KbDXCT0q4wsB3e0dZHeHL/pPv8mW3/VnAXA139ZidMEdUe8RBduAkQ/19/KcFVSe PfgltO23xlOfBbXLviMsu4ODMVyAIfjt9sPv9hyn4knZIFKWTl5m2KiAgURdL9si Yd3/7flSTRaBM2pyjPLn1twAjdqUt/xnCk4aAFuoClb38CHaTmiMNsV8WTq2j6vW QR9bUGXEKg6r0IBKZKaeQDLPMnJlhqe0Op+nVb/nATJB0tqbi4swW2+rHabzDaOQ zVpLfzUCgYEA2NQqoiG8xj0ytf8FAAlWosWUf6K182TUUrhMi0u30HYmLVJfR6uN XiWcLkebNLKnVJolbd4Z7iPx2d9TgmWE0BP0dJricQyWs8CHb78QhjK0RTOQjY/+ OL5OsTTeaisgP+kryznoOmhkFgkpY9OSy21XWB1jUyBSYrcLoRTL0xMCgYEAy3wx t0SSuz7C1uYYM1O1GD/XiKyt/qq0iHLGO0YZ31oHO3vFgsdvFFO8BUbPG1Ynnu+4 0m2FIs6nzV5JsGVpvzVHvJt/xuMRcxc2JID8ZYhV3vbKqAYrcTaODx+02BiRJWYE yTP+r6pAKJxlugQIY353WyaATWOqCB/YEQp7sQ8CgYAaqcRwWYu4KPBidvCrd3qC 258OLvkG7CA759Pp0S7SYKUDL7ztuEfTCvbwrfeE/G8dNTNjFkvEAAGOlCrVvxwc 5kdKS32K/0xM4GEHOcyTZArM87FT5yAQ5D4TBnhPP+xgT5EGFaHcBNhB6XCAiRTl FRYHjN2Y7EGVSAMTFNaXpwKBgAcg+rzo8hsNP9Y3iXGC5T1MP0jSg+YAJQMCwl8h PZbNmKNE2s6SHhogNN4adPcINasjyt3UaG2nv8k6HGrJosLIIxNAf2GAYwQdNBBj VHRaKmf9TWxFixAUUTXGbpeDhNJCmLhT0gBlfontsMKrkX+q1pOi7avIahSOyQsP yvWRAoGAM2cyhd43P9CkpoIzrZenHyf90uAZqCjjwqn7lkeIq9xSaN3z6v/VAeJy LCE5/4EPVZghDrkTHGnHu3S7uroIsN8UhybtBJlKJL5BdZP1Z4B+0YFweyzYBLB4 oXgHxPzAm3IXf+EVPD5cuI8eGeHn8cdSfW6W+F9MoqAXR6DSa30= -----END RSA PRIVATE KEY-----
Output sample
With the previous input, this page will output this hash:
id_rsa:$sshng$1$16$66B68106BC61AC96913154D42496162E$1200$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
- $sshng$0$ stands for 3DES
- $sshng$1$ stands for RSA, DSA keys using AES-128
- $sshng$2$ stands for bcrypt PBKDF + AES-256-CBC / AES-256-CTR
- $sshng$3$ stands for EC keys using AES-128
- $sshng$4$ stands for RSA, DSA keys using AES-192
- $sshng$5$ stands for RSA, DSA keys using AES-256
Disclaimer
It's essential to note that tools like John the Ripper or hashcat are powerful and can be misused. We strongly advise using these tools responsibly and ethically. Always ensure that you have permission before attempting to crack passwords, and familiarize yourself with local laws and organizational security policies. Misuse of these tools can lead to severe legal repercussions and breach of ethical standards.
Credits
Credits go to JohnTheRipper project ; https://github.com/magnumripper/JohnTheRipper/