Hashcat


Hashcat
World's fastest password cracker
World's first and only in-kernel rule engine


Feature:
Free
Open-Source (MIT License)
Multi-OS (Linux, Windows and OSX)

Refer
https://hashcat.net/hashcat/

...

Main parameter

-a: Attack Modes
0 = Straight
1 = Combination
2 = Toggle case
3 = Brute Force
ps:
https://hashcat.net/wiki/doku.php?id=combinator_attack
https://hashcat.net/wiki/doku.php?id=toggle_case_attack

-m : Hash Type
0 = MD5
50 = HMAC-MD5
1000 = NTLM
1400 = sha256

...

Straight attack
The dictionary attack, or "straight mode," is a very simple attack mode. It is also known as a "Wordlist attack".

hashcat -a 0 -m < hash type> < hash_encrypt_file > < password directory file>

...

password directory file
in Network
https://samsclass.info/123/proj10/500_passwords.txt

in KALI
gzip -d /usr/share/wordlists/rockyou.txt.gz
Rockyou contains 14 million unique passwords.

refer
https://uwnthesis.wordpress.com/2013/08/07/kali-how-to-crack-passwords-using-hashcat/


.....

brute-force attack
Tries all combinations from a given Keyspace. It is the easiest of all the attacks.

hashcat -m 0 -a 3 --increment [other parameter] < hash_encrypt_file> < mask>

-i --increment (optional):
specifies that the length of the password candidates shouldn't be fixed, but increase in length

mask (required):/brute-force Built-in charsets
?l = abcdefghijklmnopqrstuvwxyz
?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ
?d = 0123456789
?s = «space»!"#$%&'()*+,-./:;<=>?@[]^_`{|}~
?a = ?l?u?d?s
?b = 0x00 - 0xff

other parameter
--increment-min 4: set the minimum length of the password candidates to 4 (in this case)
--increment-max 6: set the maximum length of the password candidates to 6 (in this case)


ex:
if md5(123456) is e10adc3949ba59abbe56e057f20f883e
# echo e10adc3949ba59abbe56e057f20f883e > hash.txt
# hashcat -m 0 -a 3 -i hash.txt ?d?d?d?d?d?d
...omit...
e10adc3949ba59abbe56e057f20f883e:123456
All hashes have been recovered
Input.Mode: Mask (?d?d?d?d?d?d) [6]
Index.....: 0/1 (segment), 1000000 (words), 0 (bytes)
Recovered.: 1/1 hashes, 1/1 salts
Speed/sec.: - plains, 662.08k words
Progress..: 654324/1000000 (65.43%)
Running...: 00:00:00:01
Estimated.: --:--:--:--


ex:
if md5(123456) is e10adc3949ba59abbe56e057f20f883e
# echo e10adc3949ba59abbe56e057f20f883e > hash.txt
#hashcat -n 2 -m 0 -a 3 --pw-min 9 hash.txt ?d?d?d?d?d?d?d?d?d
ps:
-n = 2 threads
-pw-min 9 = minimal 9 digitals


refer
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#why_should_i_use_a_mask_attack_i_just_want_to_brute_these_hashes


 

2017-03-19 16:27:14發表 2017-03-19 21:44:14修改   

數據分析
程式開發
計算機組織與結構
資料結構與演算法
Database and MySql
manage tool
windows
unix-like
linux service
network
network layer3
network layer2
network WAN
network service
作業系統
數位鑑識
資訊安全解決方案
資訊安全威脅

Cisco security
Cisco network
Cisco layer3
Cisco layer2



  登入      [牛的大腦] | [單字我朋友] Powered by systw.net