hashcat
Fast and advanced password recovery tool. More information: <https://hashcat.net/wiki/doku.php?id=hashcat>.
Install
- All systems
-
curl cmd.cat/hashcat.sh
- Debian
-
apt-get install hashcat
- Ubuntu
-
apt-get install hashcat
- Arch Linux
-
pacman -S hashcat
- Kali Linux
-
apt-get install hashcat
- Windows (WSL2)
-
sudo apt-get update
sudo apt-get install hashcat
- OS X
-
brew install hashcat
- Dockerfile
- dockerfile.run/hashcat
Fast and advanced password recovery tool. More information: <https://hashcat.net/wiki/doku.php?id=hashcat>.
-
Perform a brute-force attack (mode 3) with the default hashcat mask:
hashcat --hash-type hash_type_id --attack-mode 3 hash_value
-
Perform a brute-force attack (mode 3) with a known pattern of 4 digits:
hashcat --hash-type hash_type_id --attack-mode 3 hash_value "?d?d?d?d"
-
Perform a brute-force attack (mode 3) using at most 8 of all printable ASCII characters:
hashcat --hash-type hash_type_id --attack-mode 3 --increment hash_value "?a?a?a?a?a?a?a?a"
-
Perform a dictionary attack (mode 0) using the RockYou wordlist of a Kali Linux box:
hashcat --hash-type hash_type_id --attack-mode 0 hash_value /usr/share/wordlists/rockyou.txt
-
Perform a rule-based dictionary attack (mode 0) using the RockYou wordlist mutated with common password variations:
hashcat --hash-type hash_type_id --attack-mode 0 --rules-file /usr/share/hashcat/rules/best64.rule hash_value /usr/share/wordlists/rockyou.txt
-
Perform a combination attack (mode 1) using the concatenation of words from two different custom dictionaries:
hashcat --hash-type hash_type_id --attack-mode 1 hash_value /path/to/dictionary1.txt /path/to/dictionary2.txt
-
Show result of an already cracked hash:
hashcat --show hash_value
© tl;dr; authors and contributors