欧美午夜精品久久久久久孕妇_日韩一区二区三免费高清在线观看_国产一区二区网址_大桥未久女教师av一区二区_av男人的天堂在线观看_亚洲国产欧美一区_亚洲风情在线资源站_精品视频在线视频_日本电影久久久_欧美顶级毛片在线播放_成人午夜三级_热舞福利精品大尺度视频_成人小视频免费在线观看_亚洲欧洲精品一区二区三区波多野1战4_欧美一区二区三区在线观看视频_日本高清中文字幕在线

Hashcat tutorial on cracking mode parameter settings

2024-12-24 20:05:32

1. Combination mode (-a 1)

Sometimes, we will encounter such a problem, for example, the password is abcdabcd mode, and we do not have abcdabcd in the dictionary, if we go to generate, it will take up a huge space, can there be a way to generate abcdabcd through abcd? In hashcat, of course, it is possible, and in this section we will first talk about this pattern, which is the dictionary combination attack pattern (parameter denoted as -a 1).

1. The combination mode of the same dictionary

First, let's describe the meaning of -a 1 with a simple example, and then take you step by step to the complex application of the pattern.

hashcat –a 1 –m 0 mima.txt –o outfile dic.txt dic.txt

0.png
The meaning of this command is to use the dictionary of dic.txt and combine it to decipher the mima.txt, if the dic.txt is a dictionary as shown in the figure below

1.png
Then the new dictionary for deciphering the mima.txt formed by the combination of the commands is:

2.png
That is, each line in the dic.txt is combined with itself to form a new dictionary.

2. The combination mode of different dictionaries

The previous description is the combination of the same dictionary, if it is a different dictionary, hashcat is also supported, using the following command

3.png
It means that all the rows in the dic1.txt are combined with all the rows in the dic2.txt to form a dictionary that solves the mima.txt.

When is the combination mode used? In general, the combination mode is clearly divided into two segments, such as: abcd1234, asdfasdf, aaa19770101、...... In other cases, the password is clearly manifested in the previous paragraph and the next paragraph.

3. What needs to be paid attention to

(1) In combination mode, hashcat can only support the combination of two dictionaries (or the same dictionary twice), and cannot support multiple dictionaries (more than 3 dictionaries) or the same dictionary more than 3 times of combination attacks.

That is, the following command is wrong:

hashcat  –a 1 –m 0 mima.txt –ooutfile dic.txt dic.txt

hashcat  –a 1 –m 0 mima.txt –ooutfile dic1.txt dic2.txt dic3.txt

(2) In combination mode, the directory is not supported (in the previous article, the entire directory is supported in the -a 0 mode), which means that the following two situations are also not possible.

hashcat  –a 1 –m 0 mima.txt –ooutfile /dic/

hashcat  –a 1 –m 0 mima.txt –ooutfile /dic/*.txt

(3) Timeliness

When using the combination mode, if the dictionary is large, for example, two dictionaries are 10,000,000, the combined space is 100,000,000,000,000,000, which is equivalent to the attack of 10,000,000 dictionaries (each dictionary has 10,000,000 entries), then the space is too large, and there may be a lot of repetition, although the coverage increases, but the timeliness is not high.

2. Brute-force attack mode (-a 3)

Brute-force hacking, as the name suggests, is to violently exhaust the specified plaintext space, which is a way to do it (because you can't narrow the exhaustion space).

Before we get into brute force, let's talk about exhausting space. Take the common lowercase letters + numbers as an example, if the password length is 4, its space is 36**4=1679616, which seems to be not big, and it will come out in a while; If the length of the password is 8, then its space is 36**8=2821109907456, and if the solution time is 1000,000,000 (1 billion times/s), the solution time is about 2820 seconds, about 47 minutes, which seems to be bearable; If the length of the password is 10, its space is 36**10=3656158440062976, and if the solution time is 1000,000,000 (1 billion times/s), the solution time exceeds 1000 hours, then there is no way to accept it.

There are many different types of brute-force attack modes (parameter denoted as -a 3) in hashcat, and we will talk about them one by one below.

1. Simple mode

There are 8 default character sets built into Hashcat, which are l (26 lowercase letters), u (26 uppercase letters), d (10 numbers), h (lowercase hexadecimal characters), H (uppercase hexadecimal characters), s (special characters 31), a (l, u, d, s collection of 95 full characters) and b (binary 0x00-0xFF). This is shown in the figure below

4.pngExample

(1) If the lowercase 6-bit space is exhausted, use the following command:

5.png(2) If the 8-bit space of all characters is exhausted, use the following command:

6.png(3) If the all-digital space with a range of 4-6 bits is exhausted, the command is as follows:

7.pngHere, a parameter --inrcement --increment-min 4 --inrcement --increment-max 6 is added to indicate the minimum and maximum values of the exhaustion length.

2. Combination mode

The combinatorial pattern here is an organizational pattern in exhaustive mode, not a (-a 1) pattern.

Let's take a quick example:

(1) If a password is exhausted and the length of the password is estimated to be 6, the first digit is the full character set, the second digit is lowercase letters, the third digit is uppercase letters, and the fourth, fifth, and sixth digits are the full character set, then the command can use the following mode:

8.png(2) The following are several combination modes,

1: If a password has a range of case + digits and a length of 6, the command is as follows:

9.pngHere -1 ?l?u?d is used to represent uppercase and lowercase letters + numbers.

2: If the exhaustion range is 6 digits, the first and fourth digits are uppercase + numbers, the second digits are uppercase and lowercase, the third and fifth digits are uppercase + digits, and the sixth digit is a number, then the command is as follows:

10.pngOf course, you can also specify the minimum and maximum lengths, as shown in the following image

11.png
3. Custom mode

Earlier, we introduced that hashcat has 8 built-in character sets, but what if the character set you need is not within these 8 types? What to do? It doesn't matter, Hashcat also has a wealth of custom brute force attack modes for everyone.

Using the hashcat –h command, you can see that the following usage patterns are defined

12.pngBelow, let's explain through one example after another:

(1) If the password length is 8 digits and each bit consists of 0123456789aqwcfhj,.<>=-_+, you can use the following commands:

13.pngYou can also write these characters as a file, such as char.txt, using the following command.

14.png(2) If the password length is 8 digits, the first, third, and sixth digits are in "43545yt", the second and fourth digits are in "345dfv-=_+", the fifth and seventh digits are in "9vjnbbf-brg", and the eighth digit is in "345fkfggh", you can use the following commands:

15.pngOf course, you can also write these characters into different files, for example char1.txt、........., use the following command.

16.pngNote: Some symbols have special meanings on the command line, so when there are special symbols in the character set, it is best to write these symbols as files.

(3) On the basis of (2), increase the minimum length and maximum length, such as 4-8 bits. You can use the following commands.

17.png

Third, the use of some parameters

In the previous article, we introduced the use of some parameters, and today, we will move on to some of the commonly used parameters. Today we will focus on the screen display parameters

In the previous article, we introduced the file output command (-o/--outfile-format), which can be used to output the hashcat password decipher to a file in a certain format. But while hashcat is running, we can't see which passwords hashcat has deciphered. If we can directly print the password deciphered by hashcat to the screen in HashCat work, it will be more intuitive and convenient. There are exactly a few parameters in hashcat that can output the hashcat running result to the screen.

1、 --show

The show command will output the deciphered hash and password cached in the pot file to the screen window.

18.png

2、--left

The left command will output the hash value of the hashcat undeciphered to the screen

19.png

3、--stdout

The stdout command does not code-break, but it prints the contents of the dictionary used for code-breaking.

20.png

Fourth, summary

If you want to give full play to the function and role of hashcat, it is recommended that you try more with different commands, so as to be familiar with the combination of different hashcat commands. For the hashcat parameter, you can refer to the hashcat online help (-h).

Previous:Hashcat is a password explosion artifact
Next:Experience sharing of hashcat using GPU acceleration to improve d
欧美午夜精品久久久久久孕妇_日韩一区二区三免费高清在线观看_国产一区二区网址_大桥未久女教师av一区二区_av男人的天堂在线观看_亚洲国产欧美一区_亚洲风情在线资源站_精品视频在线视频_日本电影久久久_欧美顶级毛片在线播放_成人午夜三级_热舞福利精品大尺度视频_成人小视频免费在线观看_亚洲欧洲精品一区二区三区波多野1战4_欧美一区二区三区在线观看视频_日本高清中文字幕在线
欧美中文一区二区| 中文文精品字幕一区二区| 成人免费大片黄在线播放| 91香蕉视频在线| 51xtv成人影院| 亚洲色在线视频| 懂色av一区二区三区免费看| 悠悠资源网亚洲青| 日韩欧美三区| 亚洲欧美日韩在线不卡| 欧美久久免费观看| 国产情人综合久久777777| 亚洲国产精品va在线看黑人| 亚洲一级二级三级在线免费观看| 亚洲国产精品精华液2区45| 精品久久久网| 亚洲人成亚洲人成在线观看图片| 国产成人av电影免费在线观看| 日韩午夜在线影院| 亚洲天堂成人网| 久久久国产亚洲精品| 国产精品福利在线观看| 666欧美在线视频| 国产精品亚洲欧美日韩一区在线| 欧美日韩国产亚洲一区| 亚洲1区在线观看| 色帝国亚洲欧美在线| 国产永久精品大片wwwapp| 日韩免费一区| av成人在线网站| 黄色网页在线免费观看| 久久国产精品亚洲| 国产成人综合久久| 精品久久久久久久久久岛国gif| 亚洲片av在线| aa国产成人| 日日夜夜精品视频免费| 欧洲午夜精品| 夜夜精品浪潮av一区二区三区| 免费日本视频一区| 最新欧美精品一区二区三区| 色综合中文网| 97精品一区二区视频在线观看| 亚洲成人av观看| 九色综合国产一区二区三区| 美女诱惑一区二区| 国产欧美一区二区三区精品观看| 女同久久另类99精品国产| 欧美一级高清免费| 国产精品186在线观看在线播放| 欧美日韩直播| 国产精品影视在线观看| 日韩天堂在线观看| 国产精品久久久久久亚洲伦| 91在线视频网址| 9lporm自拍视频区在线| 亚洲国产日本| 国产免费不卡| 影音先锋日韩精品| 欧美成人精品激情在线观看| 欧美日本免费一区二区三区| 欧美日产一区二区三区在线观看| 亚洲一区二区三区免费| 9人人澡人人爽人人精品| 麻豆精品一区二区| ww久久综合久中文字幕| 亚洲国产精品成人| 北岛玲heyzo一区二区| 日韩最新在线视频| 性欧美freesex顶级少妇| 欧美日韩视频网站| 蜜桃导航-精品导航| www.日韩不卡电影av| 97精品一区二区视频在线观看| 日韩高清在线一区| 亚洲精品裸体| 亚洲综合好骚| 精品高清美女精品国产区| 国产精品二区三区四区| 久草在线成人| 亚洲自拍小视频| 欧美精品一区二区三区视频| 一区在线播放视频| 色综合一区二区日本韩国亚洲| 国产精品黄页免费高清在线观看| 欧美最猛性xxxxx免费| 欧美成人免费电影| 国产伦久视频在线观看| 91麻豆精品国产91久久久久久| av电影在线免费| 在线亚洲+欧美+日本专区| 亚洲综合三区| 国产美女久久久| 色欧美片视频在线观看在线视频| 国产成人夜色高潮福利影视| 极品尤物久久久av免费看| 国产一区二区三区四区五区3d| 日韩二区三区在线| xnxx国产精品| 欧美日韩另类视频| 九色porny自拍视频在线观看| 午夜精品一区二区三区免费视频| 欧美精品一区二区精品网| 欧美日韩一区二| 久久综合狠狠综合久久激情| 成人在线不卡| 日本欧美加勒比视频| 亚洲丰满在线| 美女少妇全过程你懂的久久| 国产成人精品日本亚洲专区61| av不卡高清| 69av成年福利视频| 亚洲影视资源| 99porn视频在线| 麻豆精品国产传媒mv男同| 久热精品视频在线观看一区| 国产精品一区二区三区免费| 成人免费av网站| 久久er99热精品一区二区三区| 日韩视频在线你懂得| 美腿丝袜亚洲综合| 国产精品7m视频| 精品国偷自产在线视频| 国产日韩欧美不卡在线| 国内成人自拍| 久久精品久久精品国产大片| 欧美日韩一区二区三区在线免费观看| 国产亚洲一区二区三区| 欧美午夜不卡在线观看免费| 欧美日韩123区| 午夜精品一区二区三区四区| 亚洲va欧美va国产va天堂影院| 精品一区二区三区视频日产| 日韩欧美国产一区在线观看| 男女激情视频一区| 久久久国产精品午夜一区ai换脸| 中文在线资源观看视频网站免费不卡| 鲁丝一区鲁丝二区鲁丝三区| 国产农村妇女毛片精品久久麻豆| 欧美一区网站| 欧美a在线看| 国产盗摄xxxx视频xxx69| 日韩视频免费直播| 欧美猛男做受videos| 欧美日韩黄色影视| 国产女人水真多18毛片18精品| 日韩成人在线一区| 亚洲一区二区三区视频播放| 日韩.欧美.亚洲| 四季av在线一区二区三区| 亚洲精品在线观看免费| a级影片在线观看| 亚洲精品美女| 成人永久免费| 亚洲精品综合| 一区二区蜜桃| a视频网址在线观看| 亚洲风情在线资源站| 国产成人精品1024| 亚洲欧洲精品一区二区| 亚洲一区二区久久久久久| 日本高清不卡的在线| 欧美成年人视频| 欧美日韩第一|