hashcat
Fast and advanced password recovery tool.
- Perform a brute-force attack (mode 3) with the default hashcat mask:
hashcat --hash-type {hash_type_id} --attack-mode {3} {hash_value}
- Perform a brute-force attack (mode 3) with a known pattern of 4 digits:
hashcat --hash-type {hash_type_id} --attack-mode {3} {hash_value} "{?d?d?d?d}"
- Perform a brute-force attack (mode 3) using at most 8 of all printable ASCII characters:
hashcat --hash-type {hash_type_id} --attack-mode {3} --increment {hash_value} "{?a?a?a?a?a?a?a?a}"
- Perform a dictionary attack (mode 0) using the RockYou wordlist of a Kali Linux box:
hashcat --hash-type {hash_type_id} --attack-mode {0} {hash_value} {/usr/share/wordlists/rockyou.txt}
- Perform a rule-based dictionary attack (mode 0) using the RockYou wordlist mutated with common password variations:
hashcat --hash-type {hash_type_id} --attack-mode {0} --rules-file {/usr/share/hashcat/rules/best64.rule} {hash_value} {/usr/share/wordlists/rockyou.txt}
- Perform a combination attack (mode 1) using the concatenation of words from two different custom dictionaries:
hashcat --hash-type {hash_type_id} --attack-mode {1} {hash_value} {/path/to/dictionary1.txt} {/path/to/dictionary2.txt}
- Show result of an already cracked hash:
hashcat --show {hash_value}
Copyright © 2014—present the tldr-pages team and contributors.
This work is licensed under the Creative Commons Attribution 4.0 International License (CC-BY).