Hashcat
Key Usages:
Dictionary Attack: Utilizes a wordlist to try potential passwords.
hashcat -a 0 -m 0 hashes.txt wordlist.txt
Brute Force Attack: Tries all possible combinations of characters.
hashcat -a 3 -m 0 hashes.txt ?a?a?a?a
Combinator Attack: Combines words from two wordlists.
hashcat -a 1 -m 0 hashes.txt wordlist1.txt wordlist2.txt
Mask Attack: Uses patterns to reduce the search space.
hashcat -a 3 -m 0 hashes.txt ?u?l?l?l?d?d
Hybrid Attack: Combines dictionary and mask attacks.
hashcat -a 6 -m 0 hashes.txt wordlist.txt ?d?d
Tips and Tricks:
Optimize Performance:
Use
--force
to bypass warnings.Utilize GPU acceleration with appropriate drivers.
Adjust workload tuning with
-w
(e.g.,-w 3
for high).
Efficient Mask Usage:
Use masks to focus on probable patterns (e.g.,
?l?l?l?d?d
for three letters followed by two digits).
Rule-Based Attacks:
Enhance dictionary attacks with rules to generate variations.
hashcat -a 0 -m 0 hashes.txt wordlist.txt -r rules/best64.rule
Session Management:
Save and restore sessions to manage long-running tasks.
hashcat -m 0 -a 3 hashes.txt ?a?a?a?a --session=mySession hashcat --restore mySession
Hash Modes:
Specify the correct hash mode (
-m
) for your target hash type (e.g.,-m 1000
for NTLM).
Output Management:
Save cracked passwords to a file.
hashcat -m 0 -a 0 hashes.txt wordlist.txt -o found.txt
By understanding and applying these usages, tips, and tricks, you can leverage Hashcat effectively for password cracking in various scenarios.
Last updated