

KeePass Password Safe Classic Edition (1.39) KeePass Password Safe Classic Edition (1.38) KeePass Password Safe Classic Edition (1.37) KeePass Password Safe Classic Edition (1.36) KeePass Password Safe Classic Edition (1.35) Update for KeePass Password Safe Classic Edition (1.34) Update for KeePass Password Safe Classic Edition (1.33) Update for KeePass Password Safe Classic Edition (1.32) I hope you found this post useful and make sure to not use weak password for your database.KeePass Password Safe Classic Edition PreReqHandler As you can see in the screenshot we did crack the hash and the password of this SecretDB.kdbx-database was “SuperSecretPassword2020”. We then just let it run for some time and as soon as we crack the hash it will be displayed. John -wordlist=rockyou.txt KeepassHash.txt We run john and specify our custom wordlist with “–wordlist” parameter and then define our hash file. You can also use other great cracking tools like hashcat but I went with john here. I used a modified version of rockyou.txt as dictionary. In this example we will try to crack it using a dictionary and John the ripper. We now have our hash ready to be cracked. Keepass2john SecretDB.kdbx > Keepasshash.txt You can also send the output to a file by adding “>” like I did in the screenshot below. What you do to extract the hash is really simple, you just run:

It comes with Kali Linux so you don’t have to install it. To be able to crack the hash we will need to extract and save it and that can be done with the John the ripper utility tool “ keepass2john“. To demonstrate this I created a new database that I called “SecretDB.kdbx” and our mission will be to find out which master password I chose for the database.

Or to be correct we are not cracking the DB, we are cracking the password hash. In this post I will describe how you can crack a KeePass Database file (.kdbx) in an easy way.
