欧美午夜精品久久久久久孕妇_日韩一区二区三免费高清在线观看_国产一区二区网址_大桥未久女教师av一区二区_av男人的天堂在线观看_亚洲国产欧美一区_亚洲风情在线资源站_精品视频在线视频_日本电影久久久_欧美顶级毛片在线播放_成人午夜三级_热舞福利精品大尺度视频_成人小视频免费在线观看_亚洲欧洲精品一区二区三区波多野1战4_欧美一区二区三区在线观看视频_日本高清中文字幕在线

Hashcat is a password explosion artifact

2024-12-24 17:32:08

Hashcat is a password blasting artifact, one of the essential tools for information security, hereby collect this article record summary for future needs, and may also help netizens who read this article.

Brief introduction

Hashcat is the world's fastest password cracker and is an open-source, distributed tool that supports multiple platforms and algorithms.

Official: https://hashcat.net/hashcat/

Github:https://github.com/hashcat/hashcat

Installation

Windows

https://github.com/hashcat/hashcat/releases Download the latest version of the archive and unzip it to run hashcat64.exe or hashcat32.exe according to your platform

Commonly used parameters

-m 破解 hash 類型

Specify the type of hash to be cracked, followed by a number corresponding to the hash type

-a crack mode

Specify the cracking mode to be used, the value of which is followed by a reference to the parameter:

- [ Attack Modes ] -

  # | Mode
 ===+======
  0 | Straight                # 直接字典破解
  1 | Combination             # 組合破解
  3 | Brute-force             # 掩碼暴力破解
  6 | Hybrid Wordlist + Mask  # 字典+掩碼破解
  7 | Hybrid Mask + Wordlist  # 掩碼+字典破解

–increase

Enable incremental crack mode to have hashcat crack within the specified password length

–increment-min

The minimum length of the password, which is directly equal to an integer, can be used in increment mode

–increment-max

The maximum length of the password is directly equal to an integer, and the increment mode can be used together

–force

Ignore warnings during the cracking process

–remove

Delete hashes that have been cracked

–username

Ignore the specified username in the hash file, which will be used to crack the password hash of Linux users

–potfile-disable

Do not record the hash of successful cracks in the potfile

-I

--opencl-info shows information about the detected OpenCL platform/device, and if you have a good graphics card, it will be much faster to crack.

-or

--outfile specifies the location of the hash and the corresponding plaintext password after the crack is successful

-Or

--optimized-kernel-enable 啟用優化的內核(限制密碼長度)

-d

--opencl-devices 指定 opencl 的設備,我這里支持的設備列表如下:


Code


* Device #1: Intel(R) Core(TM) i7-9750H CPU @ 2.60GHz, skipped.
* Device #2: Intel(R) UHD Graphics 630, 384/1536 MB allocatable, 24MCU
* Device #3: AMD Radeon Pro 555X Compute Engine, 1024/4096 MB allocatable, 12MCU

-D

--opencl-device-types 指定 opencl 的設備類型,Hashcat 支持如下設備類型:


bash


1 | CPU2 | GPU3 | FPGA, DSP, Co-Processor

General Routine -D 2 Specified GPU Breakdown

Mask cracking

Mask rules


bash


 ? | Charset===+=========
 l | abcdefghijklmnopqrstuvwxyz          # 小寫字母 a-z
 u | ABCDEFGHIJKLMNOPQRSTUVWXYZ          # 大寫字母 A-Z
 d | 0123456789                          # 數字 0-9
 h | 0123456789abcdef                    # 數字 + abcdef
 H | 0123456789ABCDEF                    # 數字 + ABCDEF
 s |  !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~   # 特殊字符    
 a | ?l?u?d?s                            # 鍵盤上所有可見的字符
 b | 0x00 - 0xff                         # 可能是用來匹配像空格這種密碼的

Custom mask rules


bash


--custom-charset1 [chars]等價于 -1
--custom-charset2 [chars]等價于 -2
--custom-charset3 [chars]等價于 -3
--custom-charset4 [chars]等價于 -4

It is represented in the mask by ?1, ?2, ?3, ?4

Some cases:


bash


--custom-charset1 abcd123456!@-+

At this point? 1 means abcd123456!@-+


bash


--custom-charset2 ?l?d

At this point? 2 means ?l?d, i.e. ?h number + lowercase letter:


bash


-3 abcdef -4 123456

In this case, ?3?3?3?4?4?4?4 is represented as the first four digits may be abcdef, and the last four digits may be 123456

Dictionary cracking


Code


1q2w3e4r`的MD5值為`5416d7cd6ef195a0f7622a9c56b55e84


bash


hashcat -a 0 -m 0 '5416d7cd6ef195a0f7622a9c56b55e84' hashpass.txt -o success.txt

Delete the cracked password

Sometimes the following prompt will appear when cracking:


Code


INFO: All hashes found in potfile! Use --show to display them.

This shows that the password has been cracked by us before, so Hashcat will no longer show it, you can add the parameter --show to show the password at the end:


bash


hashcat -a 0 -m 0 'cbc8f5435c87e13c5d14e6ce92358d68' hashpass.txt --show
cbc8f5435c87e13c5d14e6ce92358d68:123456@abc

Hashcat 存放已經成功破解的密碼文件位置為:~/.hashcat/hashcat.potfile

如果想要直接顯示破解的密碼的話,可以直接刪除掉該文件。

批量破解


bash


# 刪除之前破解成功的記錄rm ~/.hashcat/hashcat.potfile# hash.txt為要破解的密碼 hashpass.txt為字典 導出破解的結果到success.txt 并從hash.txt刪除掉破解成功的hashcat -a 0 -m 0 hash.txt hashpass.txt -o success.txt --remove

組合破解

多字典破解


bash


hashcat -a 1 -m 0 '5416d7cd6ef195a0f7622a9c56b55e84' hashpass1.txt hashpass1.txt

Dictionary + mask cracking


bash


echo -n admin888 |openssl md5
7fef6171469e80d32c0559f88b377245

Hack the MD5 value of admin888:


bash


hashcat -a 6 -m 0 '7fef6171469e80d32c0559f88b377245' hashpass.txt -O

Mask + dictionary crack


bash


hashcat -a 7 -m 0 '7fef6171469e80d32c0559f88b377245' 'admi?l?d?d?d' hashpass.txt  -O

Cracking the case

8-bit MD5 encrypted digital cracking

MD5 encryption for 23323323:


bash


$ echo -n 23323323 |openssl md5
5a745e31dbbd93f4c86d1ef82281688b

Use Hashcat to crack it:


bash


hashcat -a 3 -m 0 --force '5a745e31dbbd93f4c86d1ef82281688b' '?d?d?d?d?d?d?d?d' -O

8-bit MD5 encrypted uppercase and lowercase letter cracking


bash


$ echo -n PassWord |openssl md5
a9d402bfcde5792a8b531b3a82669585

Use Hashcat to crack it:


bash


hashcat -a 3 -m 0 -1 '?l?u' --force  'a9d402bfcde5792a8b531b3a82669585' '?1?1?1?1?1?1?1?1' -O

There is a custom rule -1 defined here, in which case ?1 means ?l?u, i.e., uppercase and lowercase letters.

5-7 digit MD5 encrypted uppercase and lowercase letters + numbers cracked

Admin88 的 MD5 值為 2792e40d60bac94b4b163b93566e65a9


bash


hashcat -a 3 -m 0 -1 '?l?u?d' --force  '2792e40d60bac94b4b163b93566e65a9' --increment --increment-min 5 --increment-max 7 '?1?1?1?1?1?1?1' -O

There is a custom rule -1 defined here, in which case ?1 means ?l?u?d, i.e. uppercase and lowercase letters + numbers.

admin starts with 10-digit MD5 encrypted uppercase and lowercase letters + numbers cracked

admin23323 的 MD5 值為 a9991129897a44e0d1c2855c3d7dccc4


bash


hashcat -a 3 -m 0 -1 '?l?u?d' --force  'a9991129897a44e0d1c2855c3d7dccc4' 'admin?1?1?1?1?1' -O

MySQL4.1/MySQL5

To view the password for MySQL:


mysql


mysql> select Password from mysql.user;
+-------------------------------------------+
| Password                                  |
+-------------------------------------------+
| *81F5E21E35407D884A6CD4A731AEBFB6AF209E1B |
| *81F5E21E35407D884A6CD4A731AEBFB6AF209E1B |
| *81F5E21E35407D884A6CD4A731AEBFB6AF209E1B |
| *81F5E21E35407D884A6CD4A731AEBFB6AF209E1B |
+-------------------------------------------+
4 rows in set (0.00 sec)

Then start using the dictionary to crack:


bash


hashcat -a 0 -m 300 --force '81F5E21E35407D884A6CD4A731AEBFB6AF209E1B' hashpass.txt -O

Linux /etc/shadow sha512crypt $6$, SHA512 (Unix)

To view the /etc/shadow password file:


bash



root@kali-linux:~# cat /etc/shadowroot:$6$4ojiBMDPrehqrLkX$d2T7Cn8LKkLk4SDXgCh1IEqjhnsUekXaNUXSxiZIwUTndSqyd.9sEcu80sX9DuEHGmHOeoMev2O0ACYtjMett1:18201:0:99999:7:::
daemon:*:18024:0:99999:7:::
bin:*:18024:0:99999:7:::
sys:*:18024:0:99999:7:::
sync:*:18024:0:99999:7:::
games:*:18024:0:99999:7:::
man:*:18024:0:99999:7:::
lp:*:18024:0:99999:7:::
mail:*:18024:0:99999:7:::
news:*:18024:0:99999:7:::
uucp:*:18024:0:99999:7:::
proxy:*:18024:0:99999:7:::
www-data:*:18024:0:99999:7:::
backup:*:18024:0:99999:7:::
list:*:18024:0:99999:7:::
irc:*:18024:0:99999:7:::
gnats:*:18024:0:99999:7:::
nobody:*:18024:0:99999:7:::
_apt:*:18024:0:99999:7:::
systemd-timesync:*:18024:0:99999:7:::
systemd-network:*:18024:0:99999:7:::
systemd-resolve:*:18024:0:99999:7:::
mysql:!:18024:0:99999:7:::
ntp:*:18024:0:99999:7:::
messagebus:*:18024:0:99999:7:::
arpwatch:!:18024:0:99999:7:::
Debian-exim:!:18024:0:99999:7:::
uuidd:*:18024:0:99999:7:::
redsocks:!:18024:0:99999:7:::
tss:*:18024:0:99999:7:::
rwhod:*:18024:0:99999:7:::
iodine:*:18024:0:99999:7:::
miredo:*:18024:0:99999:7:::
dnsmasq:*:18024:0:99999:7:::
postgres:*:18024:0:99999:7:::
usbmux:*:18024:0:99999:7:::
rtkit:*:18024:0:99999:7:::
stunnel4:!:18024:0:99999:7:::
sshd:*:18024:0:99999:7:::
Debian-snmp:!:18024:0:99999:7:::
sslh:!:18024:0:99999:7:::
pulse:*:18024:0:99999:7:::
speech-dispatcher:!:18024:0:99999:7:::
avahi:*:18024:0:99999:7:::
saned:*:18024:0:99999:7:::
inetsim:*:18024:0:99999:7:::
colord:*:18024:0:99999:7:::
geoclue:*:18024:0:99999:7:::
king-phisher:*:18024:0:99999:7:::
Debian-gdm:*:18024:0:99999:7:::
dradis:*:18024:0:99999:7:::
beef-xss:*:18024:0:99999:7:::
systemd-coredump:!!:18082::::::

You can see that root has a password, and the encryption method used in front of the $6 surface hash is: sha512crypt $6$, SHA512 (Unix).


bash


# 掩碼破解root密碼 不在potfile中記錄破解成功的hash 指定設備2(核顯)來跑密碼 并開啟優化hashcat -a 3 -m 1800 --force  '$6$4ojiBMDPrehqrLkX$d2T7Cn8LKkLk4SDXgCh1IEqjhnsUekXaNUXSxiZIwUTndSqyd.9sEcu80sX9DuEHGmHOeoMev2O0ACYtjMett1' '?l?l?l?l' -O -d 2 --potfile-disable# 掩碼破解root密碼 忽略用戶名 不在potfile中記錄破解成功的hash 指定設備2(核顯)來跑密碼 并開啟優化hashcat -a 3 -m 1800 --force  'root:$6$4ojiBMDPrehqrLkX$d2T7Cn8LKkLk4SDXgCh1IEqjhnsUekXaNUXSxiZIwUTndSqyd.9sEcu80sX9DuEHGmHOeoMev2O0ACYtjMett1' '?l?l?l?l' -O -d 2 --username --potfile-disable

The built-in CPU and independent graphics card under macOS can't be cracked, and here Guoguang himself manually switched -d 2 with the core graphics to successfully run out:

字典破解 Windows LM Hash


bash

hashcat -a 0 -m 3000 --force '921988ba001dc8e14a3b108f3fa6cb6d' password.txt

字典破解 Windows NTLM Hash

bash

hashcat -a 0 -m 1000 --force 'e19ccf75ee54e06b06a5907af13cef42' password.txt

Distributed cracking

parametertypeillustrateKunimitsu's understandingexample
–brain-server
Enable brain serverEnable the primary server
-z, –brain-client
Enable brain client, activates -SEnable distributed clients
–brain-client-featuresADefine brain client features, see belowDefine client capabilities–brain-client-features=3
–brain-hostStBrain server host (IP or domain)The IP or domain of the primary server–brain-host=127.0.0.1
–brain-portPortBrain server portPrimary server port–brain-port=13743
–brain-passwordStBrain server authentication passwordThe authentication password of the primary server–brain-password=e8acfc7280c48009
–brain-sessionHexOverrides automatically calculated brain sessionAutomatically overwrite the primary session that has already been calculated–brain-session=0x2ae611db
–brain-session-whitelistHexAllow given sessions only, separated with commasOnly given conversations are allowed, separated by commas–brain-session-whitelist=0x2ae611db

Client features


bash

- [ Brain Client Features ] -  # | Features
 ===+========
  1 | Send hashed passwords                       # 發送已破解的密碼
  2 | Send attack positions                       # 發送已破解的位置
  3 | Send hashed passwords and attack positions  # 發送已破解的密碼和已破解的位置


Previous:Hashcat usage method and technical sharing
Next:Hashcat tutorial on cracking mode parameter settings
欧美午夜精品久久久久久孕妇_日韩一区二区三免费高清在线观看_国产一区二区网址_大桥未久女教师av一区二区_av男人的天堂在线观看_亚洲国产欧美一区_亚洲风情在线资源站_精品视频在线视频_日本电影久久久_欧美顶级毛片在线播放_成人午夜三级_热舞福利精品大尺度视频_成人小视频免费在线观看_亚洲欧洲精品一区二区三区波多野1战4_欧美一区二区三区在线观看视频_日本高清中文字幕在线
亚洲激情网站| 欧美大片大片在线播放| 欧美国产乱子伦| 亚洲综合久久av| 国产精品美女呻吟| 色网综合在线观看| 亚洲按摩av| 亚洲激情国产精品| 天天操天天干天天综合网| 精品免费视频123区| 亚洲欧美日韩国产一区| 亚洲高清久久久久久| 中文字幕日韩一区二区不卡| 亚洲国产又黄又爽女人高潮的| 国产精品成人av| 先锋影音久久久| 国产成人免费av一区二区午夜| 精品久久久久久久久国产字幕| 国产成人精品三级麻豆| 久久一区中文字幕| 97在线精品| 青草青草久热精品视频在线观看| 欧美大黑bbbbbbbbb在线| 亚洲国产成人精品女人久久久| 欧美日韩国产欧| 亚洲视频在线一区二区| 最新国产成人av网站网址麻豆| 欧洲精品亚洲精品| 欧美aaaxxxx做受视频| 日韩欧美一区二区三区免费看| 日本妇女一区| 57pao成人国产永久免费| 成人有码视频在线播放| 偷拍一区二区| 蜜桃视频免费观看一区| 成人性生交大片免费看中文网站| 国产亚洲综合久久| 亚洲精品免费在线看| 日韩欧美一二三四区| 欧美性猛交xxxx乱大交| 成人久久一区二区| 亚洲成人不卡| 亚洲国产精品成人av| 亚洲色无码播放| 天海翼精品一区二区三区| av在线不卡精品| 欧美激情成人动漫| 婷婷精品国产一区二区三区日韩| 久久av一区二区三区| gogogo高清在线观看免费完整版| 欧美精品偷拍| 成人动漫免费在线观看| 成人aaaa| 国产在线激情| 日本一区二区免费在线观看视频| 欧美伦理一区二区| 欧美亚洲丝袜传媒另类| 精品一区毛片| 福利精品一区| 91亚洲大成网污www| 噜噜爱69成人精品| 日韩欧美一二三区| 亚洲欧美日韩精品一区二区| 欧美日韩中文国产一区发布| 欧美a级片网站| 亚洲国内高清视频| 国产嫩草在线视频| 亚洲午夜电影| 日本亚洲精品在线观看| 性色av一区二区三区免费| 欧美超级乱淫片喷水| 国产99久久久国产精品成人免费| 西野翔中文久久精品国产| 性欧美xxxx视频在线观看| 水蜜桃亚洲一二三四在线| 欧美国产一区在线| 一区二区欧美在线观看| 国产精品黄色| 久久99久久99小草精品免视看| 亚洲视频在线观看免费| 午夜欧美精品| 亚洲www色| 欧美aaaaaa| 99r精品视频| 欧美猛男gaygay网站| 亚洲a成v人在线观看| 色老头在线观看| 狠狠干综合网| 国产亚洲一级| 国产中文欧美日韩在线| 国产精品高清在线| 国产成人av一区二区三区| 精品福利一二区| 久久亚洲国产精品日日av夜夜| 成人bbav| 国产精品高潮呻吟久久av无限| 久久精子c满五个校花| 777久久精品| 精品国产美女a久久9999| 免费人成在线不卡| 884aa四虎影成人精品一区| 亚洲国产精品久久久久秋霞蜜臀| 国产精品网站入口| 欧美成人免费播放| 国产精品热视频| 日韩欧美视频一区二区三区| 伊人国产精品| 色婷婷国产精品| 国产精品区二区三区日本| 久久婷婷蜜乳一本欲蜜臀| 欧美日韩一级黄| 午夜免费日韩视频| 成人午夜黄色影院| 亚洲色图图片| 成人手机电影网| 国产精品黄色av| 国产精品久久久久久久app| 中文字幕亚洲欧美在线不卡| 亚洲精品欧美一区二区三区| 国产精品主播视频| 高潮精品一区videoshd| 国产精品yjizz| 久久久久久有精品国产| 亚洲午夜未删减在线观看| 在线观看三级视频| 久久99国产精品二区高清软件| 国产精品夫妻自拍| 精品夜夜嗨av一区二区三区| 国产盗摄一区二区| 国产精品久久久久久福利一牛影视| 国产+成+人+亚洲欧洲自线| 国产无人区一区二区三区| 亚洲成人免费看| 成人精品视频在线观看| 波多野结衣一区二区三区在线观看| 天天av天天翘天天综合网| 欧美日韩国产综合一区二区三区| 久久精品这里热有精品| 午夜亚洲国产au精品一区二区| av网站免费线看精品| 日韩精品福利一区二区三区| 欧美日韩久久久一区| 亚洲国产岛国毛片在线| 激情综合网五月| 操喷在线视频| 777精品视频| 欧美喷潮久久久xxxxx| 国产精品污污网站在线观看| 欧美一区成人| 欧美午夜精品理论片a级大开眼界| 中文在线免费视频| 亚洲综合久久av| 激情五月激情综合网| 国产精品网站导航| 欧美精品日韩一本| 欧美美乳视频网站在线观看| 五月天亚洲综合| 一区二区三区精品在线观看| 99视频国产精品免费观看| 亚洲美女精品成人在线视频| 国产精品偷拍| 欧美激情成人动漫| av电影在线观看完整版一区二区| 99视频热这里只有精品免费|