This one is basically the same as pw-crack-3, the only difference is the possible passwords count.
Steps
PW Crack 3 was proposing a valid password among 6 non-valid ones. This exercise gives 100 options to validate instead.
I could go over each of them, but it wouldn't be feasible. Instead, I modified the function I created before to print out the hashes to print only the password that's hash is the same as correct_pw_hash
.
python
for p in pos_pw_list:
if (hash_pw(p) == correct_pw_hash):
print(p)
I seriously wonder why I didn't take the same route when doing PW Crack 3. I'm starting to like Python...
Flag
picoCTF{fl45h_5pr1ng1ng_ae0fb77c}