欧美午夜精品久久久久久孕妇_日韩一区二区三免费高清在线观看_国产一区二区网址_大桥未久女教师av一区二区_av男人的天堂在线观看_亚洲国产欧美一区_亚洲风情在线资源站_精品视频在线视频_日本电影久久久_欧美顶级毛片在线播放_成人午夜三级_热舞福利精品大尺度视频_成人小视频免费在线观看_亚洲欧洲精品一区二区三区波多野1战4_欧美一区二区三区在线观看视频_日本高清中文字幕在线

Hashcat is a password explosion artifact

2024-12-24 17:32:08

Hashcat is a password blasting artifact, one of the essential tools for information security, hereby collect this article record summary for future needs, and may also help netizens who read this article.

Brief introduction

Hashcat is the world's fastest password cracker and is an open-source, distributed tool that supports multiple platforms and algorithms.

Official: https://hashcat.net/hashcat/

Github:https://github.com/hashcat/hashcat

Installation

Windows

https://github.com/hashcat/hashcat/releases Download the latest version of the archive and unzip it to run hashcat64.exe or hashcat32.exe according to your platform

Commonly used parameters

-m 破解 hash 類型

Specify the type of hash to be cracked, followed by a number corresponding to the hash type

-a crack mode

Specify the cracking mode to be used, the value of which is followed by a reference to the parameter:

- [ Attack Modes ] -

  # | Mode
 ===+======
  0 | Straight                # 直接字典破解
  1 | Combination             # 組合破解
  3 | Brute-force             # 掩碼暴力破解
  6 | Hybrid Wordlist + Mask  # 字典+掩碼破解
  7 | Hybrid Mask + Wordlist  # 掩碼+字典破解

–increase

Enable incremental crack mode to have hashcat crack within the specified password length

–increment-min

The minimum length of the password, which is directly equal to an integer, can be used in increment mode

–increment-max

The maximum length of the password is directly equal to an integer, and the increment mode can be used together

–force

Ignore warnings during the cracking process

–remove

Delete hashes that have been cracked

–username

Ignore the specified username in the hash file, which will be used to crack the password hash of Linux users

–potfile-disable

Do not record the hash of successful cracks in the potfile

-I

--opencl-info shows information about the detected OpenCL platform/device, and if you have a good graphics card, it will be much faster to crack.

-or

--outfile specifies the location of the hash and the corresponding plaintext password after the crack is successful

-Or

--optimized-kernel-enable 啟用優化的內核(限制密碼長度)

-d

--opencl-devices 指定 opencl 的設備,我這里支持的設備列表如下:


Code


* Device #1: Intel(R) Core(TM) i7-9750H CPU @ 2.60GHz, skipped.
* Device #2: Intel(R) UHD Graphics 630, 384/1536 MB allocatable, 24MCU
* Device #3: AMD Radeon Pro 555X Compute Engine, 1024/4096 MB allocatable, 12MCU

-D

--opencl-device-types 指定 opencl 的設備類型,Hashcat 支持如下設備類型:


bash


1 | CPU2 | GPU3 | FPGA, DSP, Co-Processor

General Routine -D 2 Specified GPU Breakdown

Mask cracking

Mask rules


bash


 ? | Charset===+=========
 l | abcdefghijklmnopqrstuvwxyz          # 小寫字母 a-z
 u | ABCDEFGHIJKLMNOPQRSTUVWXYZ          # 大寫字母 A-Z
 d | 0123456789                          # 數字 0-9
 h | 0123456789abcdef                    # 數字 + abcdef
 H | 0123456789ABCDEF                    # 數字 + ABCDEF
 s |  !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~   # 特殊字符    
 a | ?l?u?d?s                            # 鍵盤上所有可見的字符
 b | 0x00 - 0xff                         # 可能是用來匹配像空格這種密碼的

Custom mask rules


bash


--custom-charset1 [chars]等價于 -1
--custom-charset2 [chars]等價于 -2
--custom-charset3 [chars]等價于 -3
--custom-charset4 [chars]等價于 -4

It is represented in the mask by ?1, ?2, ?3, ?4

Some cases:


bash


--custom-charset1 abcd123456!@-+

At this point? 1 means abcd123456!@-+


bash


--custom-charset2 ?l?d

At this point? 2 means ?l?d, i.e. ?h number + lowercase letter:


bash


-3 abcdef -4 123456

In this case, ?3?3?3?4?4?4?4 is represented as the first four digits may be abcdef, and the last four digits may be 123456

Dictionary cracking


Code


1q2w3e4r`的MD5值為`5416d7cd6ef195a0f7622a9c56b55e84


bash


hashcat -a 0 -m 0 '5416d7cd6ef195a0f7622a9c56b55e84' hashpass.txt -o success.txt

Delete the cracked password

Sometimes the following prompt will appear when cracking:


Code


INFO: All hashes found in potfile! Use --show to display them.

This shows that the password has been cracked by us before, so Hashcat will no longer show it, you can add the parameter --show to show the password at the end:


bash


hashcat -a 0 -m 0 'cbc8f5435c87e13c5d14e6ce92358d68' hashpass.txt --show
cbc8f5435c87e13c5d14e6ce92358d68:123456@abc

Hashcat 存放已經成功破解的密碼文件位置為:~/.hashcat/hashcat.potfile

如果想要直接顯示破解的密碼的話,可以直接刪除掉該文件。

批量破解


bash


# 刪除之前破解成功的記錄rm ~/.hashcat/hashcat.potfile# hash.txt為要破解的密碼 hashpass.txt為字典 導出破解的結果到success.txt 并從hash.txt刪除掉破解成功的hashcat -a 0 -m 0 hash.txt hashpass.txt -o success.txt --remove

組合破解

多字典破解


bash


hashcat -a 1 -m 0 '5416d7cd6ef195a0f7622a9c56b55e84' hashpass1.txt hashpass1.txt

Dictionary + mask cracking


bash


echo -n admin888 |openssl md5
7fef6171469e80d32c0559f88b377245

Hack the MD5 value of admin888:


bash


hashcat -a 6 -m 0 '7fef6171469e80d32c0559f88b377245' hashpass.txt -O

Mask + dictionary crack


bash


hashcat -a 7 -m 0 '7fef6171469e80d32c0559f88b377245' 'admi?l?d?d?d' hashpass.txt  -O

Cracking the case

8-bit MD5 encrypted digital cracking

MD5 encryption for 23323323:


bash


$ echo -n 23323323 |openssl md5
5a745e31dbbd93f4c86d1ef82281688b

Use Hashcat to crack it:


bash


hashcat -a 3 -m 0 --force '5a745e31dbbd93f4c86d1ef82281688b' '?d?d?d?d?d?d?d?d' -O

8-bit MD5 encrypted uppercase and lowercase letter cracking


bash


$ echo -n PassWord |openssl md5
a9d402bfcde5792a8b531b3a82669585

Use Hashcat to crack it:


bash


hashcat -a 3 -m 0 -1 '?l?u' --force  'a9d402bfcde5792a8b531b3a82669585' '?1?1?1?1?1?1?1?1' -O

There is a custom rule -1 defined here, in which case ?1 means ?l?u, i.e., uppercase and lowercase letters.

5-7 digit MD5 encrypted uppercase and lowercase letters + numbers cracked

Admin88 的 MD5 值為 2792e40d60bac94b4b163b93566e65a9


bash


hashcat -a 3 -m 0 -1 '?l?u?d' --force  '2792e40d60bac94b4b163b93566e65a9' --increment --increment-min 5 --increment-max 7 '?1?1?1?1?1?1?1' -O

There is a custom rule -1 defined here, in which case ?1 means ?l?u?d, i.e. uppercase and lowercase letters + numbers.

admin starts with 10-digit MD5 encrypted uppercase and lowercase letters + numbers cracked

admin23323 的 MD5 值為 a9991129897a44e0d1c2855c3d7dccc4


bash


hashcat -a 3 -m 0 -1 '?l?u?d' --force  'a9991129897a44e0d1c2855c3d7dccc4' 'admin?1?1?1?1?1' -O

MySQL4.1/MySQL5

To view the password for MySQL:


mysql


mysql> select Password from mysql.user;
+-------------------------------------------+
| Password                                  |
+-------------------------------------------+
| *81F5E21E35407D884A6CD4A731AEBFB6AF209E1B |
| *81F5E21E35407D884A6CD4A731AEBFB6AF209E1B |
| *81F5E21E35407D884A6CD4A731AEBFB6AF209E1B |
| *81F5E21E35407D884A6CD4A731AEBFB6AF209E1B |
+-------------------------------------------+
4 rows in set (0.00 sec)

Then start using the dictionary to crack:


bash


hashcat -a 0 -m 300 --force '81F5E21E35407D884A6CD4A731AEBFB6AF209E1B' hashpass.txt -O

Linux /etc/shadow sha512crypt $6$, SHA512 (Unix)

To view the /etc/shadow password file:


bash



root@kali-linux:~# cat /etc/shadowroot:$6$4ojiBMDPrehqrLkX$d2T7Cn8LKkLk4SDXgCh1IEqjhnsUekXaNUXSxiZIwUTndSqyd.9sEcu80sX9DuEHGmHOeoMev2O0ACYtjMett1:18201:0:99999:7:::
daemon:*:18024:0:99999:7:::
bin:*:18024:0:99999:7:::
sys:*:18024:0:99999:7:::
sync:*:18024:0:99999:7:::
games:*:18024:0:99999:7:::
man:*:18024:0:99999:7:::
lp:*:18024:0:99999:7:::
mail:*:18024:0:99999:7:::
news:*:18024:0:99999:7:::
uucp:*:18024:0:99999:7:::
proxy:*:18024:0:99999:7:::
www-data:*:18024:0:99999:7:::
backup:*:18024:0:99999:7:::
list:*:18024:0:99999:7:::
irc:*:18024:0:99999:7:::
gnats:*:18024:0:99999:7:::
nobody:*:18024:0:99999:7:::
_apt:*:18024:0:99999:7:::
systemd-timesync:*:18024:0:99999:7:::
systemd-network:*:18024:0:99999:7:::
systemd-resolve:*:18024:0:99999:7:::
mysql:!:18024:0:99999:7:::
ntp:*:18024:0:99999:7:::
messagebus:*:18024:0:99999:7:::
arpwatch:!:18024:0:99999:7:::
Debian-exim:!:18024:0:99999:7:::
uuidd:*:18024:0:99999:7:::
redsocks:!:18024:0:99999:7:::
tss:*:18024:0:99999:7:::
rwhod:*:18024:0:99999:7:::
iodine:*:18024:0:99999:7:::
miredo:*:18024:0:99999:7:::
dnsmasq:*:18024:0:99999:7:::
postgres:*:18024:0:99999:7:::
usbmux:*:18024:0:99999:7:::
rtkit:*:18024:0:99999:7:::
stunnel4:!:18024:0:99999:7:::
sshd:*:18024:0:99999:7:::
Debian-snmp:!:18024:0:99999:7:::
sslh:!:18024:0:99999:7:::
pulse:*:18024:0:99999:7:::
speech-dispatcher:!:18024:0:99999:7:::
avahi:*:18024:0:99999:7:::
saned:*:18024:0:99999:7:::
inetsim:*:18024:0:99999:7:::
colord:*:18024:0:99999:7:::
geoclue:*:18024:0:99999:7:::
king-phisher:*:18024:0:99999:7:::
Debian-gdm:*:18024:0:99999:7:::
dradis:*:18024:0:99999:7:::
beef-xss:*:18024:0:99999:7:::
systemd-coredump:!!:18082::::::

You can see that root has a password, and the encryption method used in front of the $6 surface hash is: sha512crypt $6$, SHA512 (Unix).


bash


# 掩碼破解root密碼 不在potfile中記錄破解成功的hash 指定設備2(核顯)來跑密碼 并開啟優化hashcat -a 3 -m 1800 --force  '$6$4ojiBMDPrehqrLkX$d2T7Cn8LKkLk4SDXgCh1IEqjhnsUekXaNUXSxiZIwUTndSqyd.9sEcu80sX9DuEHGmHOeoMev2O0ACYtjMett1' '?l?l?l?l' -O -d 2 --potfile-disable# 掩碼破解root密碼 忽略用戶名 不在potfile中記錄破解成功的hash 指定設備2(核顯)來跑密碼 并開啟優化hashcat -a 3 -m 1800 --force  'root:$6$4ojiBMDPrehqrLkX$d2T7Cn8LKkLk4SDXgCh1IEqjhnsUekXaNUXSxiZIwUTndSqyd.9sEcu80sX9DuEHGmHOeoMev2O0ACYtjMett1' '?l?l?l?l' -O -d 2 --username --potfile-disable

The built-in CPU and independent graphics card under macOS can't be cracked, and here Guoguang himself manually switched -d 2 with the core graphics to successfully run out:

字典破解 Windows LM Hash


bash

hashcat -a 0 -m 3000 --force '921988ba001dc8e14a3b108f3fa6cb6d' password.txt

字典破解 Windows NTLM Hash

bash

hashcat -a 0 -m 1000 --force 'e19ccf75ee54e06b06a5907af13cef42' password.txt

Distributed cracking

parametertypeillustrateKunimitsu's understandingexample
–brain-server
Enable brain serverEnable the primary server
-z, –brain-client
Enable brain client, activates -SEnable distributed clients
–brain-client-featuresADefine brain client features, see belowDefine client capabilities–brain-client-features=3
–brain-hostStBrain server host (IP or domain)The IP or domain of the primary server–brain-host=127.0.0.1
–brain-portPortBrain server portPrimary server port–brain-port=13743
–brain-passwordStBrain server authentication passwordThe authentication password of the primary server–brain-password=e8acfc7280c48009
–brain-sessionHexOverrides automatically calculated brain sessionAutomatically overwrite the primary session that has already been calculated–brain-session=0x2ae611db
–brain-session-whitelistHexAllow given sessions only, separated with commasOnly given conversations are allowed, separated by commas–brain-session-whitelist=0x2ae611db

Client features


bash

- [ Brain Client Features ] -  # | Features
 ===+========
  1 | Send hashed passwords                       # 發送已破解的密碼
  2 | Send attack positions                       # 發送已破解的位置
  3 | Send hashed passwords and attack positions  # 發送已破解的密碼和已破解的位置


Previous:Hashcat usage method and technical sharing
Next:Hashcat tutorial on cracking mode parameter settings
欧美午夜精品久久久久久孕妇_日韩一区二区三免费高清在线观看_国产一区二区网址_大桥未久女教师av一区二区_av男人的天堂在线观看_亚洲国产欧美一区_亚洲风情在线资源站_精品视频在线视频_日本电影久久久_欧美顶级毛片在线播放_成人午夜三级_热舞福利精品大尺度视频_成人小视频免费在线观看_亚洲欧洲精品一区二区三区波多野1战4_欧美一区二区三区在线观看视频_日本高清中文字幕在线
国产精品免费一区二区三区观看| 少妇av一区二区三区| 在线免费观看日本欧美| 国产日韩综合一区二区性色av| 丝袜诱惑制服诱惑色一区在线观看| 亚洲香蕉av在线一区二区三区| 九色综合狠狠综合久久| av最新在线| 成人片在线看| 91视频www| 高清毛片在线观看| 亚洲三级国产| jizzjizz亚洲| 婷婷五月色综合香五月| 色素色在线综合| 精品国产丝袜高跟鞋| 欧美日韩免费精品| yw.139尤物在线精品视频| 夜夜嗨av一区二区三区网站四季av| 亚洲va欧美va国产综合久久| 99超碰麻豆| 国产精品三级| 葵司免费一区二区三区四区五区| 国产成人精品一区二区三区在线| 91精品视频免费看| 国产一区二区三区四区五区3d| 日韩写真欧美这视频| aaa亚洲精品一二三区| 日韩精品一区二| 精品毛片三在线观看| 日韩色性视频| 国产一区日韩一区| 欧美精品自拍| a在线播放不卡| 日韩不卡一区二区| 欧美一区国产一区| 国产日韩欧美精品电影三级在线| 成人动漫一区| 久久精品视频观看| 成人精品国产| 亚洲欧美国产高清va在线播| 国产三级三级三级精品8ⅰ区| 日韩视频在线免费观看| 亚洲一卡二卡三卡四卡无卡久久| 亚洲最大av网| 国产精品一区二区免费福利视频| 色噜噜久久综合| 欧美性受极品xxxx喷水| 欧美一级电影免费在线观看| 91九色成人| 精品三级久久| 欧美一级鲁丝片| 狠狠做深爱婷婷综合一区| 国产精品自产拍高潮在线观看| 日韩激情欧美| 伊人伊成久久人综合网站| 亚洲美女精品一区| 日韩精品最新网址| 91老师国产黑色丝袜在线| 欧美精品精品一区| 国产伦精品一区二区三区免| 成人免费在线观看视频| 国产黑丝在线一区二区三区| 欧美日韩一区二区在线视频| 亚洲小说区图片区| 少妇精品视频一区二区免费看| av在线最新| 香蕉成人啪国产精品视频综合网| 精品日韩在线观看| 亚洲精品电影网| 久久99精品国产| 国产乱肥老妇国产一区二| 蜜桃传媒视频麻豆第一区免费观看| 欧美激情视频在线| 国产成人精品在线观看| 久久视频精品在线| 国产精品第四页| 一区二区三区免费在线看| 日韩不卡一区| 欧美丝袜丝交足nylons| 久久成人在线视频| 亚洲视频在线免费| 精品一区二区三区不卡| 欧美成aaa人片在线观看蜜臀| 69成人精品免费视频| 一区二区三区精品在线| 在线亚洲自拍| 丁香婷婷久久| 日韩有码一区| 欧美激情1区| 日韩欧美国产网站| 国产女同性恋一区二区| 91精品国产综合久久久久久豆腐| 欧美性生交大片免费| 欧美另类xxx| 欧美一区二区| a'aaa级片在线观看| 久久激情五月激情| 国产伦精品一区二区三区高清| 国产麻豆视频一区| 精品久久久久久中文字幕| 国产经典一区二区| xxxxx性欧美特大| 欧美美女一区| 视频一区免费观看| 亚洲成年人影院| 欧美久久久久久蜜桃| 黄污视频在线观看| av在线一区二区三区| 国产精品日本一区二区三区在线| 日本在线精品视频| 国产成人日日夜夜| 日本一区二区三区四区| 91亚洲精华国产精华精华液| 亚洲国产精品久久不卡毛片| 2019中文字幕免费视频| 欧美精品久久久久久久久老牛影院| 在这里有精品| 亚洲欧美国产精品桃花| 久久久久久免费毛片精品| 亚洲欧美激情另类校园| 欧美激情免费看| 日韩电影在线观看网站| 亚洲视频一二| 国产亚洲精久久久久久| 欧美色爱综合| 久久久亚洲午夜电影| 成人av影视在线| 日韩一区二区久久久| 亚洲国产aⅴ精品一区二区三区| 视频一区视频二区视频三区高| 性做久久久久久久免费看| 日韩av片永久免费网站| av日韩电影| 夜夜嗨av一区二区三区| 欧美日韩精品免费观看视欧美高清免费大片| 欧美激情成人| 日韩av懂色| 亚洲аv电影天堂网| 色综合久久中文综合久久牛| 黑人巨大精品欧美一区二区| 欧美精品福利在线| 日本视频在线免费观看| 欧美麻豆久久久久久中文| 成人影院网站ww555久久精品| 成人av资源在线观看| 亚洲精品在线国产| 福利在线导航136| 国产人成亚洲第一网站在线播放| 日韩美女一区二区三区四区| 美女一区二区在线观看| 国产精品视频区| 韩国19禁主播vip福利视频| 麻豆国产精品视频| 日韩精品一区二区三区丰满| 欧美日韩国产精选| 国产高清视频在线| 国产精品色悠悠| 中文字幕精品—区二区四季| 欧美特黄a级高清免费大片a级| www.8ⅹ8ⅹ羞羞漫画在线看| 精品国产精品一区二区夜夜嗨| 欧美日韩中文字幕综合视频| 国产综合色激情|