欧美午夜精品久久久久久孕妇_日韩一区二区三免费高清在线观看_国产一区二区网址_大桥未久女教师av一区二区_av男人的天堂在线观看_亚洲国产欧美一区_亚洲风情在线资源站_精品视频在线视频_日本电影久久久_欧美顶级毛片在线播放_成人午夜三级_热舞福利精品大尺度视频_成人小视频免费在线观看_亚洲欧洲精品一区二区三区波多野1战4_欧美一区二区三区在线观看视频_日本高清中文字幕在线

Hashcat tutorial on cracking mode parameter settings

2024-12-24 20:05:32

1. Combination mode (-a 1)

Sometimes, we will encounter such a problem, for example, the password is abcdabcd mode, and we do not have abcdabcd in the dictionary, if we go to generate, it will take up a huge space, can there be a way to generate abcdabcd through abcd? In hashcat, of course, it is possible, and in this section we will first talk about this pattern, which is the dictionary combination attack pattern (parameter denoted as -a 1).

1. The combination mode of the same dictionary

First, let's describe the meaning of -a 1 with a simple example, and then take you step by step to the complex application of the pattern.

hashcat –a 1 –m 0 mima.txt –o outfile dic.txt dic.txt

0.png
The meaning of this command is to use the dictionary of dic.txt and combine it to decipher the mima.txt, if the dic.txt is a dictionary as shown in the figure below

1.png
Then the new dictionary for deciphering the mima.txt formed by the combination of the commands is:

2.png
That is, each line in the dic.txt is combined with itself to form a new dictionary.

2. The combination mode of different dictionaries

The previous description is the combination of the same dictionary, if it is a different dictionary, hashcat is also supported, using the following command

3.png
It means that all the rows in the dic1.txt are combined with all the rows in the dic2.txt to form a dictionary that solves the mima.txt.

When is the combination mode used? In general, the combination mode is clearly divided into two segments, such as: abcd1234, asdfasdf, aaa19770101、...... In other cases, the password is clearly manifested in the previous paragraph and the next paragraph.

3. What needs to be paid attention to

(1) In combination mode, hashcat can only support the combination of two dictionaries (or the same dictionary twice), and cannot support multiple dictionaries (more than 3 dictionaries) or the same dictionary more than 3 times of combination attacks.

That is, the following command is wrong:

hashcat  –a 1 –m 0 mima.txt –ooutfile dic.txt dic.txt

hashcat  –a 1 –m 0 mima.txt –ooutfile dic1.txt dic2.txt dic3.txt

(2) In combination mode, the directory is not supported (in the previous article, the entire directory is supported in the -a 0 mode), which means that the following two situations are also not possible.

hashcat  –a 1 –m 0 mima.txt –ooutfile /dic/

hashcat  –a 1 –m 0 mima.txt –ooutfile /dic/*.txt

(3) Timeliness

When using the combination mode, if the dictionary is large, for example, two dictionaries are 10,000,000, the combined space is 100,000,000,000,000,000, which is equivalent to the attack of 10,000,000 dictionaries (each dictionary has 10,000,000 entries), then the space is too large, and there may be a lot of repetition, although the coverage increases, but the timeliness is not high.

2. Brute-force attack mode (-a 3)

Brute-force hacking, as the name suggests, is to violently exhaust the specified plaintext space, which is a way to do it (because you can't narrow the exhaustion space).

Before we get into brute force, let's talk about exhausting space. Take the common lowercase letters + numbers as an example, if the password length is 4, its space is 36**4=1679616, which seems to be not big, and it will come out in a while; If the length of the password is 8, then its space is 36**8=2821109907456, and if the solution time is 1000,000,000 (1 billion times/s), the solution time is about 2820 seconds, about 47 minutes, which seems to be bearable; If the length of the password is 10, its space is 36**10=3656158440062976, and if the solution time is 1000,000,000 (1 billion times/s), the solution time exceeds 1000 hours, then there is no way to accept it.

There are many different types of brute-force attack modes (parameter denoted as -a 3) in hashcat, and we will talk about them one by one below.

1. Simple mode

There are 8 default character sets built into Hashcat, which are l (26 lowercase letters), u (26 uppercase letters), d (10 numbers), h (lowercase hexadecimal characters), H (uppercase hexadecimal characters), s (special characters 31), a (l, u, d, s collection of 95 full characters) and b (binary 0x00-0xFF). This is shown in the figure below

4.pngExample

(1) If the lowercase 6-bit space is exhausted, use the following command:

5.png(2) If the 8-bit space of all characters is exhausted, use the following command:

6.png(3) If the all-digital space with a range of 4-6 bits is exhausted, the command is as follows:

7.pngHere, a parameter --inrcement --increment-min 4 --inrcement --increment-max 6 is added to indicate the minimum and maximum values of the exhaustion length.

2. Combination mode

The combinatorial pattern here is an organizational pattern in exhaustive mode, not a (-a 1) pattern.

Let's take a quick example:

(1) If a password is exhausted and the length of the password is estimated to be 6, the first digit is the full character set, the second digit is lowercase letters, the third digit is uppercase letters, and the fourth, fifth, and sixth digits are the full character set, then the command can use the following mode:

8.png(2) The following are several combination modes,

1: If a password has a range of case + digits and a length of 6, the command is as follows:

9.pngHere -1 ?l?u?d is used to represent uppercase and lowercase letters + numbers.

2: If the exhaustion range is 6 digits, the first and fourth digits are uppercase + numbers, the second digits are uppercase and lowercase, the third and fifth digits are uppercase + digits, and the sixth digit is a number, then the command is as follows:

10.pngOf course, you can also specify the minimum and maximum lengths, as shown in the following image

11.png
3. Custom mode

Earlier, we introduced that hashcat has 8 built-in character sets, but what if the character set you need is not within these 8 types? What to do? It doesn't matter, Hashcat also has a wealth of custom brute force attack modes for everyone.

Using the hashcat –h command, you can see that the following usage patterns are defined

12.pngBelow, let's explain through one example after another:

(1) If the password length is 8 digits and each bit consists of 0123456789aqwcfhj,.<>=-_+, you can use the following commands:

13.pngYou can also write these characters as a file, such as char.txt, using the following command.

14.png(2) If the password length is 8 digits, the first, third, and sixth digits are in "43545yt", the second and fourth digits are in "345dfv-=_+", the fifth and seventh digits are in "9vjnbbf-brg", and the eighth digit is in "345fkfggh", you can use the following commands:

15.pngOf course, you can also write these characters into different files, for example char1.txt、........., use the following command.

16.pngNote: Some symbols have special meanings on the command line, so when there are special symbols in the character set, it is best to write these symbols as files.

(3) On the basis of (2), increase the minimum length and maximum length, such as 4-8 bits. You can use the following commands.

17.png

Third, the use of some parameters

In the previous article, we introduced the use of some parameters, and today, we will move on to some of the commonly used parameters. Today we will focus on the screen display parameters

In the previous article, we introduced the file output command (-o/--outfile-format), which can be used to output the hashcat password decipher to a file in a certain format. But while hashcat is running, we can't see which passwords hashcat has deciphered. If we can directly print the password deciphered by hashcat to the screen in HashCat work, it will be more intuitive and convenient. There are exactly a few parameters in hashcat that can output the hashcat running result to the screen.

1、 --show

The show command will output the deciphered hash and password cached in the pot file to the screen window.

18.png

2、--left

The left command will output the hash value of the hashcat undeciphered to the screen

19.png

3、--stdout

The stdout command does not code-break, but it prints the contents of the dictionary used for code-breaking.

20.png

Fourth, summary

If you want to give full play to the function and role of hashcat, it is recommended that you try more with different commands, so as to be familiar with the combination of different hashcat commands. For the hashcat parameter, you can refer to the hashcat online help (-h).

Previous:Hashcat is a password explosion artifact
Next:Experience sharing of hashcat using GPU acceleration to improve d
欧美午夜精品久久久久久孕妇_日韩一区二区三免费高清在线观看_国产一区二区网址_大桥未久女教师av一区二区_av男人的天堂在线观看_亚洲国产欧美一区_亚洲风情在线资源站_精品视频在线视频_日本电影久久久_欧美顶级毛片在线播放_成人午夜三级_热舞福利精品大尺度视频_成人小视频免费在线观看_亚洲欧洲精品一区二区三区波多野1战4_欧美一区二区三区在线观看视频_日本高清中文字幕在线
久久久久久999| 亚洲第一福利视频在线| 欧美色图免费看| 97色伦图片97综合影院| 欧美日韩第一视频| 日韩三级在线免费观看| 中国人与牲禽动交精品| 一卡二卡三卡日韩欧美| 在线手机中文字幕| 麻豆久久久9性大片| 国产成人在线影院| 久久这里有精品视频| 99国产超薄肉色丝袜交足的后果| 成人性生交大片免费看小说| 久久久久久久久久久电影| 青青视频一区二区| 日本精品va在线观看| 亚洲色图av在线| 亚洲春色综合另类校园电影| 国产精品视频一区二区高潮| 中文字幕免费精品一区高清| 日韩视频免费观看高清在线视频| 日韩高清中文字幕一区| 亚洲激情一区二区三区| 国产精品久久久久久久久久免费看| 久久久99精品久久| 精品国产a一区二区三区v免费| 欧美wwwww| 夜夜亚洲天天久久| 中文精品久久| 色播五月激情综合网| 欧美二区乱c黑人| 日韩亚洲视频在线| 免费人成黄页网站在线一区二区| 日韩精品一区国产麻豆| 精品99一区二区| 久久久www成人免费精品张筱雨| 日韩男女性生活视频| 日韩美女精品在线| 亚洲综合免费观看高清完整版在线| 日本精品视频| 久久不射中文字幕| 国产专区一区二区| 亚洲国产日韩欧美在线图片| 日韩专区av| 日韩国产精品一区二区三区| 久久国产电影| 激情小说综合网| 欧洲高清一区二区| 范冰冰一级做a爰片久久毛片| 免费欧美日韩国产三级电影| 精品国产综合区久久久久久| 亚洲一区二区三区四区五区午夜| 欧美美女一区二区三区| 巨大荫蒂视频欧美大片| 羞羞影院欧美| 欧美人xxxx| 污片视频在线免费观看| 3d动漫啪啪精品一区二区免费| 亚洲国产日韩欧美综合久久| 91精品国产色综合久久不卡粉嫩| 国产精品亚洲第一区在线暖暖韩国| 亚洲国产黄色片| 99亚偷拍自图区亚洲| 精品国产一区二区国模嫣然| 成人做爰视频www| 免费在线成人av| 日韩精品中文字幕在线观看| 久久久精品日韩欧美| 国产欧亚日韩视频| 国产亚洲精品综合一区91| 成人影院免费观看| 欧美黑人猛交的在线视频| 91网上在线视频| 极品美女一区二区三区| 日韩精品一区二区三区四区视频| 欧美视频在线观看| 九九久久精品一区| av免费在线网站| 精品视频一区 二区 三区| 91精品国产自产精品男人的天堂| 精品区一区二区| 在线播放日韩av| 亚洲自拍欧美另类| 亚洲娇小xxxx欧美娇小| 91成人免费观看| 成人免费高清在线播放| 国产精品视频自在线| 亚洲三级 欧美三级| 国产欧美精品一区| 加勒比在线一区二区三区观看| mm1313亚洲国产精品美女| 成人黄色综合网站| 国产精品三级在线观看| 亚洲精品午夜久久久| 国产亚洲一区二区三区在线观看| 在线看av的网址| 国产一本一道久久香蕉| 精品一区二区三区香蕉蜜桃| 性欧美videos高清hd4k| 另类少妇人与禽zozz0性伦| 亚洲日本免费电影| 不卡高清视频专区| 国模娜娜一区二区三区| 欧美天堂视频| 国产精品一卡二卡三卡| 成人片在线免费看| 欧美精品1区2区| 在线激情免费视频| 亚洲视频第一页| 国产日韩亚洲欧美| 亚洲成在人线免费观看| 国精产品一区二区三区有限公司| 欧美在线视频二区| 一区二区三区在线播放| 精品动漫3d一区二区三区免费| 国产精品国产亚洲精品看不卡15| 国产91在线观看丝袜| 午夜伦理福利在线| 91超碰碰碰碰久久久久久综合| 日韩免费视频线观看| 日韩精品免费| 亚洲第一在线综合网站| 欧美性大战久久久久久久| 日韩欧美亚洲综合| 国产精品污www一区二区三区| 91国产高清在线| 亚洲男女网站| 国产福利在线视频| 777国产偷窥盗摄精品视频| 中文字幕免费国产精品| 欧美性猛交xxxx免费看漫画| 国产精品亚洲综合在线观看| 日韩专区在线视频| 欧美激情一区在线| 亚洲激情电影中文字幕| 日韩欧美精品免费在线| 91精品在线影院| 性色一区二区三区| 亚洲免费毛片网站| 久久精品五月婷婷| 国内精彩免费自拍视频在线观看网址| …久久精品99久久香蕉国产| 亚洲欧美中文另类| 福利在线视频导航| 人偷久久久久久久偷女厕| 91嫩草国产线观看亚洲一区二区| 亚洲美女网站| 国产成人av电影免费在线观看| 日韩欧美在线观看强乱免费| 麻豆一区二区99久久久久| 亚洲一区av在线| 激情图区综合网| 国产精品一线天粉嫩av| 中文字幕亚洲欧美日韩在线不卡| 91精品国产综合久久久久久豆腐| 日韩免费成人网| 91丝袜国产在线播放| 精品视频在线导航| 国产精品v欧美精品v日本精品动漫| 欧美被日视频| 亚洲影院色在线观看免费| 日韩av激情| 国产亚洲高清一区|