{"id":25505,"date":"2020-02-18T16:57:30","date_gmt":"2020-02-18T11:27:30","guid":{"rendered":"https:\/\/www.armourinfosec.com\/?p=25505"},"modified":"2020-03-30T13:37:58","modified_gmt":"2020-03-30T08:07:58","slug":"password-cracking-with-hashcat","status":"publish","type":"post","link":"https:\/\/www.armourinfosec.com\/password-cracking-with-hashcat\/","title":{"rendered":"Password Cracking with Hashcat"},"content":{"rendered":"
Hello Friends, Today I’m going to explain the Hashcat password Cracking Tool, As I learn from my cybersecurity classes and reading some blogs doing practices and the help of infosec boy’s able to explain it, so obviously the credits goes to Armour Infosec<\/a><\/strong>. Password cracking and user account exploitation is one of the most issues in cybersecurity field. Password Cracking tools, like Hashcat and John the Ripper, Provide the potential attackers to check billions of passwords per second against Victim’s password hashes. these tools have proved to be effective in cracking passwords, recent research shows that combining deep learning techniques with these tools can produce significantly better results. Specifically, using Generative Adversarial Networks (GANs), which comprises of two neural networks, to generate high-quality password guesses can improve the existing tools to match 51%-73% more passwords than just the tools alone. This significant improvement demonstrates that this new approach using deep learning can generate numerous new pass-words that were once beyond the reach of other tools.On one hand, this is an impressive result driven by researchers of deep learning and cybersecurity, and on the other, a strong warning to the community of the increasing dangers of weak password authentication.<\/p>\n This blog is a reference guide for cracking, tool usage and supportive.tools that assist pentesters in password recovery (cracking). this will not be covering the installation of these tools but will include references to their proper installation, and if all else fails, Google. Updates and additions to this blog are planned yearly as advancements in cracking evolve.<\/p>\n \u201cPassword recovery is a battle against math, time, cost, and human behavior, and much like any battle, the tactics are constantly\u00a0 evolving.\u201d<\/p>\n In order to follow many of the techniques in this manual, you will need to install the following software on your UNIX host. This book does not cover how to install said software and assumes you were able to follow the included links and extensive support websites.<\/span><\/p>\n HASHCAT v5.1.0 (or newer)<\/strong> JOHN THE RIPPER 1.9.0-jumbo-1 (or newer)<\/strong> Hashcat-utils v1.9 (or newer)<\/strong> WEAKPASS DICTIONARY<\/strong> CRACKSTATION DICTIONARY<\/strong> SKULL SECURITY WORDLISTS<\/strong> Throughout the manual, generic names have been given to the various inputs required in a cracking<\/strong> Lastly, as a good reference for testing various hash types to place into your \u201chash.txt\u201d file, the below<\/strong> HASHCAT HASH FORMAT EXAMPLES<\/strong> JOHN THE RIPPER HASH FORMAT EXAMPLES<\/strong> ENCODING vs HASHING vs ENCRYPTING<\/strong> CPU vs GPU<\/strong> CRACKING TIME = KEYSPACE \/ HASHRATE<\/strong> \u201cthere isn\u2019t a foolproof method for identifying which hash function was used by simply looking at the hash, but there are reliable clues (i.e. $6$ sha512crypt).The best method is to know from where the hash was extracted and identify the hash function for that software\u201d<\/p><\/blockquote>\n DICTIONARY\/WORDLIST ATTACK<\/strong> = straight attack uses a precompiled list of words, phrases, BRUTE-FORCE ATTACK<\/strong> = attempts every possible combination of a given character set, usually up RULE ATTACK<\/strong> = generates permutations against a given wordlist by modifying, trimming, MASK ATTACK<\/strong> = a form of targeted brute-force attack by using placeholders for characters in certain HYBRID ATTACK<\/strong> = combines a Dictionary and Mask Attack by taking input from the dictionary and EXPECTED RESULTS<\/strong> DICTIONARY\/WORDLIST vs BRUTE-FORCE vs ANALYSIS<\/strong> CRACKING METHODOLOGY<\/strong> 1 – EXTRACT HASHES<\/strong> 2 – FORMAT HASHES<\/strong> 3 – EVALUATE HASH STRENGTH<\/strong> 4 – CALCULATE CRACKING RIG CAPABILITIES<\/strong> Hash Crackers\/Bit Coin Miners<\/strong><\/p>\n <\/p>\n Fast Hash One<\/strong> <\/p>\n <\/p>\n <\/p>\n 25 GPU Hash Cracker<\/strong> <\/p>\n <\/p>\n To know about your System capability,use these command to get the result.<\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n <\/p>\n Based on these results you will be able to better assess your attack options by knowing your rigs capabilities against a specific hash. This will be a more accurate result of a hash\u2019s cracking speed based on your rig.It will be useful to save these results for future reference.<\/p>\n 5 – FORMULATE PLAN<\/strong> 6 – ANALYZE PASSWORDS<\/strong> 7 – CUSTOM ATTACKS<\/strong> 8 – ADVANCED ATTACKS<\/strong> 9 – REPEAT<\/strong> This is only meant as a basic guide to processing hashes and each scenario will obviously be unique 1 – CUSTOM WORDLIST<\/strong> This will work only for MD5 hash where:-<\/p>\n -a 0 designates a dictionary attack After cracking the output file will show you the passwords of cracked hashes like down below…<\/p>\n <\/p>\n <\/p>\n <\/p>\n 2 – CUSTOM WORDLIST + RULES<\/strong> https:\/\/www.armourinfosec.com\/performing-rule-based-attack-using-hashcat\/<\/a><\/p>\n 3 – DICTIONARY\/WORDLIST<\/strong> 4 – DICTIONARY\/WORDLIST + RULES<\/strong> for the output open matched.rule to which rules are worked.<\/p>\n 5 – CUSTOM WORDLIST + RULES<\/strong> 6 – MASK<\/strong> <\/p>\n The list of all recovered passwords of given hashes.<\/p>\n <\/p>\n 7 – HYBRID DICTIONARY + MASK<\/strong> 8 – CUSTOM WORDLIST + RULES<\/strong> 9 – COMBO<\/strong> 10 – CUSTOM HYBRID ATTACK<\/strong> 11 – CUSTOM MASK ATTACK<\/strong> 12 – BRUTE-FORCE<\/strong> Hashcat has the following charsets built-in:<\/p>\n WEAKPASS<\/strong> DOWNLOAD RESOURCES<\/strong><\/p>\n WEAKPASS<\/strong> CeWL<\/strong> SMEEGESCRAPE<\/strong> Scrape keywords from target website and output into wordlist.<\/p>\n GENERATE PASSWORD HASHES<\/strong><\/p>\n HASHCAT<\/strong> MDXFIND<\/strong> LYRICPASS (Song Lyrics Password Generator)<\/strong><\/p>\n GPUHASH<\/strong> COMMON HASH EXAMPLES<\/strong><\/span><\/p>\n MDS (<\/strong>HASHCAT)<\/p>\n HASH FORMAT BRUTE FORCE ATTACK<\/strong><\/p>\n WORDLIST ATTACK<\/strong><\/p>\n WORDLIST + RULE ATTACK<\/strong><\/p>\n NTLM (PWDUMP)<\/strong><\/p>\n HASH FORMAT<\/strong>Table of content<\/strong><\/h4>\n
\n
\n
REQUIRED SOFTWARE<\/h3>\n
\nhttps:\/\/hashcat.net\/hashcat\/<\/a><\/p>\n
\nhttps:\/\/www.openwall.com\/john\/<\/a><\/p>\n
\nhttps:\/\/hashcat.net\/wiki\/doku.php?id=hashcat_utils<\/a><\/p>\nAdditionally you will need dictionaries\/wordlists and highly recommend the below sources:<\/span><\/h5>\n
\nhttps:\/\/weakpass.com\/wordlist<\/a><\/p>\n
\nhttps:\/\/crackstation.net\/buy-crackstation-wordlist-password-cracking-dictionary.htm<\/a><\/p>\n
\nhttps:\/\/wiki.skullsecurity.org\/index.php?title=Passwords<\/a><\/p>\n
\ncommands structure. Legend description is below:<\/strong><\/p>\nCOMMAND STRUCTURE LEGEND<\/strong>
\nhashcat<\/strong> = Generic representation of the various Hashcat binary names (hashcat tool)<\/span>
\njohn<\/strong> = Generic representation of the John the Ripper binary names (John tool)<\/span>
\n#type<\/strong> = Hash type; which is an abbreviation in John or a number in Hashcat (hash MD5,MD4..)<\/span>
\nhash.txt<\/strong> = File containing target hashes to be cracked (Raw hash list )<\/span>
\ndict.txt<\/strong> = File containing dictionary\/wordlist (password list)<\/span>
\nrule.txt<\/strong> = File containing permutation rules to alter dict.txt input<\/span>
\npasswords.txt<\/strong> = File containing cracked password results<\/span>
\noutfile.txt<\/strong> = File containing results of some functions output<\/span><\/h5>\n
\nsites contain all the various hashing algorithms and example output tailored for each cracking tool:<\/strong><\/p>\n
\nhttps:\/\/hashcat.net\/wiki\/doku.php?id=example_hashes<\/a><\/p>\n
\nhttp:\/\/pentestmonkey.net\/cheat-sheet\/john-the-ripper-hash-formats<\/a>
\nhttp:\/\/openwall.info\/wiki\/john\/sample-hashes<\/p>\nCORE HASH CRACKING KNOWLEDGE-:<\/span><\/h3>\n
\nEncoding = transforms data into a publicly known scheme for usability
\nHashing = one-way cryptographic function nearly impossible to reverse
\nEncrypting = mapping of input data and output data reversible with a key<\/p>\n
\nCPU = 2\u201372 cores mainly optimized for sequential serial processing
\nGPU = 1000\u2019s of cores with 1000\u2019s of threads for parallel processing<\/p>\n
\nKeyspace: charset^length (?a?a?a?a = 95\u2074 = 81,450,625)
\nHashrate: hashing function \/ hardware power (bcrypt \/ GTX1080 = 13094 H\/s)
\nCracking Time: 81,450,625 \/ 13094 H\/s = 6,220 seconds
\n*Keyspace displayed and Hashrate vary by tool and hardware used.
\nSALT = random data that\u2019s used as additional input to a one-way function
\nITERATIONS = the number of times an algorithm is run over a given hash<\/p>\nHASH IDENTIFICATION<\/h3>\n
\nand common\/unique strings and Might be genrated according to the Information gathered to attempt to match a password.<\/p>\n
\nto a certain length.(work like the probability mathod to make combinations)<\/p>\n
\nextending, expanding, combining, or skipping words.<\/p>\n
\npositions (i.e<\/strong>. ?a?a?a?l?d?d<\/strong>).<\/p>\n
\nadding mask placeholders (i.e. dict.txt ?d?d?d)<\/strong>.CRACKING RIG = from a basic laptop to a 64 GPU cluster, this is the hardware\/ platform
\non which you perform your password hash attacks.<\/p>\n
\nKnow your cracking rig\u2019s capabilities by performing benchmark testing and don\u2019t assume you can
\nachieve the same results posted by forum members without using the exact same dictionary, attack plan,
\nor hardware setup.Cracking success largely depends on your ability to use resources efficiently and
\nmake calculated trade-offs based on the target hash.<\/p>\n
\nDictionaries and brute-force are not the end all be all to crack hashes.They are merely the beginning and end of an attack plan.I\u2019ll say True mastery is everything in the middle,where analysis and information gathering of passwords,patterns, behaviors, and policiesaffords the ability to recover that last 20%. Experiment with your attacks and research and compile targeted wordlists with your new knowledge.Do not rely heavily on dictionaries because they can only help you with what is \u201cknown\u201d and not the unknown.In realworld Analysis of target and gather information to make your own dictionary\/wordlist is best way to attack and get credentials of the target easier and faster.<\/p>\n
\nFollowing is basic cracking methodology broken into steps,but the process is subject to change based on current\/future target information uncovered during the cracking process.<\/p>\n
\nPull hashes from target,Victim Machine,identify hashing function, and properly format output for your tool of choice.<\/p>\n
\nFormat your hashes based on your tool\u2019s preferred method.See tool documentation for this guidance.
\nHashcat,for example,on each line takes <user>:<hash> OR just the plain <hash>.<\/p>\n
\nUsing the Appendix table \u201cHash Cracking Speed (Slow-Fast)\u201d assess your target hash and it\u2019s cracking
\nspeed.If it\u2019s a slow hash,you will need to be more selective at what types of dictionaries and attacks
\nyou perform.If it\u2019s a fast hash,you can be more liberal with your attack strategy.<\/p>\n
\nWith the information from evaluating the hash strength,baseline your cracking rig\u2019s capabilities.
\nPerform benchmark testing using John The Ripper and\/or Hashcat\u2019s built-in benchmark ability on your
\nrig,it\u2019s totally depends on your hardware.for example have a look..!<\/p>\n<\/p>\n
\n\u2022 1.536TH\/s \u2013 Cost 3-5,000 dollars.<\/p>\n<\/p>\n
\n\u2022 An eight character NTLM password
\ncracked in 5.5 hours. 14 character LM
\nhash cracked in six minutes.350 billion
\nhashes per second.<\/p>\nhashcat --benchmark --force\r\nhashcat -b -m 0 --force\r\n<\/pre>\n
<\/p>\n
\nBased on known or unknown knowledge begin creating an attack plan.Included on the next page is a
\n\u201cBasic Cracking\u201d to get you started.<\/p>\n
\nAfter successfully cracking a sufficient amount of hashes analyze the results for any clues or patterns.
\nThis analysis may aid in your success on any remaining hashes.<\/p>\n
\nBased on your password analysis create custom attacks leveraging those known clues or patterns.
\nExamples would be custom mask attacks or rules to fit target users\u2019 behavior or preferences.just by doing some social engineering and footprinting or depends on your knowldge.<\/p>\n
\nExperiment with Princeprocessor, custom Markov-chains, maskprocessor, or custom dictionary attacks
\nto shake out those remaining stubborn hashes. This is where your expertise and creativity really come
\ninto play.<\/p>\n
\nGo back to STEP 4 and continue the process over again, tweaking dictionaries, mask, parameters, and
\nmethods.gather some more information about,You\u2019re in the grind at this point and need to rely on skill and luck.<\/p>\nBasic-cracking<\/strong><\/h3>\n
\nbased on external circumstances.For this attack plan we will assume we know the password hashes are
\nraw MD5 and assume we have already captured some plain text passwords of users.If we had no
\nknowledge of plain text passwords we would most likely skip to DICTIONARY\/WORDLIST attacks.
\nLastly,since MD5 is a \u201cFast\u201d hash we can be more liberal with our attack plan.<\/p>\n
\nFirst compile your known plain text passwords into a custom wordlist file.Pass this to your tool of
\nchoice as a straight dictionary attack.<\/p>\nhashcat -a 0 -m 0 -w 4 hash.txt custom_list.txt\r\nhashcat -a 0 -m 0 -w 4 hash.txt pass.txt --force<\/pre>\n
\n-m 0 designates the type of hash we are cracking (MD5)
\n-w 4 workload profile
\n-o cracked.txt is the output file for the cracked passwords.
\nhash.txt is our input file of hashes.
\ncustom_list.txt is the wordlist file for this dictionary attack.<\/p>\n<\/p>\n
<\/p>\n
\nRun your custom wordlist with permutation rules to crack slight variations.Rules will help you to get password sooner as you have the information about victim hash.follow this link to know more about rule based attack.after all this is rockyou.txt not custom wordlist you can use according to your victim.<\/p>\nhashcat -a 0 -m 0 target_hash\/mayhem.hash \/usr\/share\/wordlists\/rockyou.txt -r rules --debug-mode=1 --debug-file=matched.rule --force<\/pre>\n
<\/p>\n
\nPerform a broad dictionary attack, looking for common passwords and leaked passwords in well known
\ndictionaries\/wordlists.I’m using best64.rule of hashcat and rockyou.txt to crack.<\/p>\nhashcat -a 0 -m 0 target_hash\/mayhem.hash \/usr\/share\/wordlists\/rockyou.txt -r best64.rule --debug-mode=1 --debug-file=matched.rule --force<\/pre>\n
<\/p>\n
\nAdd rule permutations to the broad dictionary attack, looking for subtle changes to common words\/phrases and leaked passwords.<\/p>\nhashcat -a 0 -m 0 -w 4 target_hash\/mayhem.hash \/usr\/share\/wordlists\/rockyou.txt -r \/usr\/share\/hashcat\/rules\/best64.rule --debug-mode=1 --debug-file=matched.rule --force\r\n<\/pre>\n
<\/strong><\/p>\n
\nAdd any newly discovered passwords to your custom wordlist and run an attack again with permutation
\nrules, looking any other variations,just by hitting the echo or awk to append the new rule.and then use the above command.
\n:: awk -F \u201c:\u201d \u2018{print $2}\u2019 hashcat.potfile >> custom_list.txt<\/p>\n
\nNow we will use mask attacks included with Hashcat to search the keyspace for common password
\nlengths and patterns, based on the RockYou dataset.there’s many pattern of passwords inside the rockyou-1-6-.hcmask like our rule based attack.go to the link to find all paths of hashcat https:\/\/centos.pkgs.org\/6\/forensics-i386\/hashcat-3.00-1.el6.i686.rpm.html <\/a>Already stored masks of hashcat.(note: attack mode will be change -a 0 to -a 3)<\/p>\n<\/p>\n
hashcat -a 3 -m 0 -w 4 target_hash\/mayhem.hash \/usr\/share\/hashcat\/masks\/rockyou-1-60.hcmask --force\r\n<\/pre>\n
<\/p>\n
<\/p>\n
\nUsing a dictionary of your choice, conduct hybrid attacks looking for larger variations of common words or known passwords by appending\/prepending masks to those candidates.now i think you’re able to run the commands according to needs.can’t show you all the output screen shots.there’s lots more i have to cover in this blog so lets move on to the next..<\/p>\nhashcat -a 7 -m 0 -w 4 hash.txt rockyou-1\u201360.hcmask dict.txt\r\nhashcat -a 6 -m 0 -w 4 hash.txt dict.txt rockyou-1-60.hcmask<\/pre>\n
\nAdd any newly discovered passwords back to your custom wordlist and run an attack again with
\npermutation rules looking any other subtle variations.<\/p>\nawk -F \u201c:\u201d \u2018{print $2}\u2019 hashcat.potfile >> custom_list.txt\r\nhashcat -a 0 -m 0 -w 4 hash.txt custom_list.txt -r dive.rule --loopback<\/pre>\n
\nUsing a dictionary of your choice, perform a combo attack by individually combining the dictionary\u2019s
\npassword candidates together to form new candidates.just mean combinig to dictionary’s to crack the hash.<\/p>\nhashcat -a 1 -m 0 -w 4 hash.txt dict.txt dict.txt<\/pre>\n
\nAdd any newly discovered passwords back to your custom wordlist and perform a hybrid attack against
\nthose new acquired passwords.<\/p>\nawk -F \u201c:\u201d \u2018{print $2}\u2019 hashcat.potfile >> custom_list.txt\r\nhashcat -a 6 -m 0 -w 4 hash. txt custom_list.txt rockyou-1-60.hcmask\r\nhashcat -a 7 -m 0 -w 4 hash. txt rockyou-1-60.hcmask custom_list.txt<\/pre>\n
\nBy now the easier, weaker passwords may have fallen to cracking, but still some remain.Using PACK
\ncreate custom mask attacks based on your currently cracked passwords. Be sure to sort out<\/p>\nmasks that match the previous rockyou-1-60.hcmask list.\r\nhashcat -a 3 -m 0 -w 4 hash.txt custom_masks.hcmask<\/pre>\n
\nWhen all else fails begin a standard brute-force attack, being selective as to how large a keyspace your
\nrig can adequately brute-force. Above 8 characters this is typically pointless due to hardware limitations
\nand password entropy\/ complexity.This particular mask will attempt to bruteforce an 8 character password.<\/p>\n?l = abcdefghijklmnopqrstuvwxyz (lowercase)\r\n?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ(uppercase)\r\n?d = 0123456789(digits) \r\n?h = 0123456789abcdef(digit+lowercase)\r\n?H = 0123456789ABCDEF(d+u)\r\n?s = \u00abspace\u00bb!\"#$%&'()*+,-.\/:;<=>?@[\\]^_`{|}~ (special char)\r\n?a = ?l?u?d?s (all alpha + lwrc + digit + special char)\r\n\r\n<\/pre>\n
hashcat -a 3 -m 0 -w 4 target_hash\/mayhem.hash -i ?a?a?a?a?a?a?a?a --force<\/pre>\n
<\/p>\n
<\/p>\n
ONLINE PASSWORD ANALYSIS RESOURCES<\/strong><\/h4>\n
\nAnalyzes public password dumps and provides efficient dictionaries for download.
\nhttp:\/\/weakpass.com\/<\/a>
\nPASSWORD RESEARCH<\/strong>
\nImportant password security and authentication research papers in one place.
\nhttp:\/\/www.passwordresearch.com\/<\/a>
\nTHE PASSWORD PROJECT<\/strong>
\nCompiled analysis of larger password dumps using PIPAL and PASSPAL tools.
\nhttp:\/\/www.thepasswordproject.com\/leaked_password_lists_and_dictionaries<\/a><\/p>\nDICTIONARY \/ WORDLIST<\/strong><\/h4>\n
\nhttp:\/\/weakpass.com\/wordlist<\/a>
\nCRACKSTATION DICTIONARY<\/strong>
\nhttps:\/\/crackstation.net\/buy-crackstation-wordlist-password-cracking-dictionary.htm<\/a>
\nHAVE I BEEN PWNED<\/strong>
\n*You\u2019ll have to crack the SHA1\u2019s
\nhttps:\/\/haveibeenpwned.com\/passwords<\/a>
\nSKULL SECURITY WORDLISTS<\/strong>
\nhttps:\/\/wiki.skullsecurity.org\/index.php?title=Passwords<\/a>
\nCAPSOP<\/strong>
\nhttps:\/\/wordlists.capsop.com\/<\/a>
\nUNIX-NINJA DNA DICTIONARY<\/strong>
\n*Dictionary link at bottom of article*
\nhttps:\/\/www.unix-ninja.com\/p\/Password_DNA<\/a>
\nPROBABLE-WORDLIST<\/strong>
\nhttps:\/\/github.com\/berzerk0\/Probable-Wordlists<\/a>
\nEFF-WORDLIST<\/strong>
\nLong-list (7,776 words) & Short-list (1,296 words)
\nhttps:\/\/www.eff.org\/files\/2016\/07\/18\/eff_large_wordlist.txt<\/a>
\nhttps:\/\/www.eff.org\/files\/2016\/09\/08\/eff_short_wordlist_1.txt<\/a>
\nRAINBOW TABLES<\/strong>
\n*Rainbow Tables are for the most part obsolete but provided here for reference*
\nhttp:\/\/project-rainbowcrack.com\/table.htm<\/a><\/p>\nTARGETED WORDLISTS<\/strong><\/h4>\n
\nCustom wordlist generator scrapes & compiles keywords from websites.
\nhttps:\/\/digi.ninja\/projects\/cewl.php<\/a>
\nExample scan depth of 2 and minimum word length of 5 output to wordlist.txt<\/p>\ncewl -d 2 -m 5 -w wordlist.txt http:\/\/<target website><\/pre>\n
<\/strong><\/p>\n
\nText file and website scraper which generates custom wordlists from content.
\nhttp:\/\/www.smeegesec.com\/2014\/01\/smeegescrape-text-scraper-and-custom.html<\/a>
\nCompile unique keywords from text file and output into wordlist.<\/p>\nSmeegeScrape.py -f file.txt -o wordlist.txt<\/pre>\n
SmeegeScrape.py -u http:\/\/<target website> -si -o wordlist.txt<\/pre>\n
\nhttps:\/\/github.com\/hashcat\/hashcat\/tree\/master\/tools<\/a><\/p>\ntest.pl passthrough <#type> <#> dict.txt<\/pre>\n
\nhttps:\/\/hashes.org\/mdxfind.php<\/p>\necho | mdxfind -z -h \u2018<#type>\u2019 dict.txt<\/pre>\n
python3 lyricpass.py -a \"eminem\"\r\n<\/pre>\n
<\/p>\n
ONLINE HASH CRACKING SERVICES<\/strong><\/h4>\n
\nhttps:\/\/gpuhash.me\/<\/a>
\nCRACKSTATION<\/strong>
\nhttps:\/\/crackstation.net\/<\/a>
\nONLINE HASH CRACK<\/strong>
\nhttps:\/\/www.onlinehashcrack.com\/<\/a>
\nHASH HUNTERS<\/strong>
\nhttp:\/\/www.hashhunters.net\/<\/a><\/p>\nMD5, NTLM, NTLMv2, LM, MD5crypt, SHA1, SHA256, bcrypt, PDF 1.4 - 1.6 (Acrobat 5-8),\r\nMicrosoft OFFICE 2013, RAR3-HP, Winzip, 7zip, Bitcoin\/Litecoin, MAC OSX v10.5-v10.6,\r\nMySQL 4.1-5+, Postgres, MSSQL(2012)-MSSQL(2014), Oracle 11g, Cisco TYPE 4 5 8 9, WPA\r\nPSK \/ WPA2 PSK<\/pre>\n
\n8743b52063cd84097a65dl633f5c74f5<\/p>\nhashcat -m 0 -a 3 hash.txt ?a?a?a?a?a?a<\/pre>\n
hashcat -m 0 -a 0 hash.txt dict.txt<\/pre>\n
hashcat -m 0 -a 0 hash.txt dict.txt -r rule.txt<\/pre>\n
\nb4b9b02e6f09a9bd760f388b67351e2b
\nBRUTE FORCE ATTACK<\/strong>
\nhashcat -m 1000 -a 3 hash.txt ?a?a?a?a?a?a
\nWORDLIST ATTACK<\/strong>
\nhashcat -m 1000 -a 0 hash.txt dict.txt
\nWORDLIST + RULE ATTACK<\/strong>
\nhashcat -m 1000 -a 0 hash.txt dict.txt -r rule.txt<\/p>\n