欧美午夜精品久久久久久孕妇_日韩一区二区三免费高清在线观看_国产一区二区网址_大桥未久女教师av一区二区_av男人的天堂在线观看_亚洲国产欧美一区_亚洲风情在线资源站_精品视频在线视频_日本电影久久久_欧美顶级毛片在线播放_成人午夜三级_热舞福利精品大尺度视频_成人小视频免费在线观看_亚洲欧洲精品一区二区三区波多野1战4_欧美一区二区三区在线观看视频_日本高清中文字幕在线

Hashcat tutorial on cracking mode parameter settings

2024-12-24 20:05:32

1. Combination mode (-a 1)

Sometimes, we will encounter such a problem, for example, the password is abcdabcd mode, and we do not have abcdabcd in the dictionary, if we go to generate, it will take up a huge space, can there be a way to generate abcdabcd through abcd? In hashcat, of course, it is possible, and in this section we will first talk about this pattern, which is the dictionary combination attack pattern (parameter denoted as -a 1).

1. The combination mode of the same dictionary

First, let's describe the meaning of -a 1 with a simple example, and then take you step by step to the complex application of the pattern.

hashcat –a 1 –m 0 mima.txt –o outfile dic.txt dic.txt

0.png
The meaning of this command is to use the dictionary of dic.txt and combine it to decipher the mima.txt, if the dic.txt is a dictionary as shown in the figure below

1.png
Then the new dictionary for deciphering the mima.txt formed by the combination of the commands is:

2.png
That is, each line in the dic.txt is combined with itself to form a new dictionary.

2. The combination mode of different dictionaries

The previous description is the combination of the same dictionary, if it is a different dictionary, hashcat is also supported, using the following command

3.png
It means that all the rows in the dic1.txt are combined with all the rows in the dic2.txt to form a dictionary that solves the mima.txt.

When is the combination mode used? In general, the combination mode is clearly divided into two segments, such as: abcd1234, asdfasdf, aaa19770101、...... In other cases, the password is clearly manifested in the previous paragraph and the next paragraph.

3. What needs to be paid attention to

(1) In combination mode, hashcat can only support the combination of two dictionaries (or the same dictionary twice), and cannot support multiple dictionaries (more than 3 dictionaries) or the same dictionary more than 3 times of combination attacks.

That is, the following command is wrong:

hashcat  –a 1 –m 0 mima.txt –ooutfile dic.txt dic.txt

hashcat  –a 1 –m 0 mima.txt –ooutfile dic1.txt dic2.txt dic3.txt

(2) In combination mode, the directory is not supported (in the previous article, the entire directory is supported in the -a 0 mode), which means that the following two situations are also not possible.

hashcat  –a 1 –m 0 mima.txt –ooutfile /dic/

hashcat  –a 1 –m 0 mima.txt –ooutfile /dic/*.txt

(3) Timeliness

When using the combination mode, if the dictionary is large, for example, two dictionaries are 10,000,000, the combined space is 100,000,000,000,000,000, which is equivalent to the attack of 10,000,000 dictionaries (each dictionary has 10,000,000 entries), then the space is too large, and there may be a lot of repetition, although the coverage increases, but the timeliness is not high.

2. Brute-force attack mode (-a 3)

Brute-force hacking, as the name suggests, is to violently exhaust the specified plaintext space, which is a way to do it (because you can't narrow the exhaustion space).

Before we get into brute force, let's talk about exhausting space. Take the common lowercase letters + numbers as an example, if the password length is 4, its space is 36**4=1679616, which seems to be not big, and it will come out in a while; If the length of the password is 8, then its space is 36**8=2821109907456, and if the solution time is 1000,000,000 (1 billion times/s), the solution time is about 2820 seconds, about 47 minutes, which seems to be bearable; If the length of the password is 10, its space is 36**10=3656158440062976, and if the solution time is 1000,000,000 (1 billion times/s), the solution time exceeds 1000 hours, then there is no way to accept it.

There are many different types of brute-force attack modes (parameter denoted as -a 3) in hashcat, and we will talk about them one by one below.

1. Simple mode

There are 8 default character sets built into Hashcat, which are l (26 lowercase letters), u (26 uppercase letters), d (10 numbers), h (lowercase hexadecimal characters), H (uppercase hexadecimal characters), s (special characters 31), a (l, u, d, s collection of 95 full characters) and b (binary 0x00-0xFF). This is shown in the figure below

4.pngExample

(1) If the lowercase 6-bit space is exhausted, use the following command:

5.png(2) If the 8-bit space of all characters is exhausted, use the following command:

6.png(3) If the all-digital space with a range of 4-6 bits is exhausted, the command is as follows:

7.pngHere, a parameter --inrcement --increment-min 4 --inrcement --increment-max 6 is added to indicate the minimum and maximum values of the exhaustion length.

2. Combination mode

The combinatorial pattern here is an organizational pattern in exhaustive mode, not a (-a 1) pattern.

Let's take a quick example:

(1) If a password is exhausted and the length of the password is estimated to be 6, the first digit is the full character set, the second digit is lowercase letters, the third digit is uppercase letters, and the fourth, fifth, and sixth digits are the full character set, then the command can use the following mode:

8.png(2) The following are several combination modes,

1: If a password has a range of case + digits and a length of 6, the command is as follows:

9.pngHere -1 ?l?u?d is used to represent uppercase and lowercase letters + numbers.

2: If the exhaustion range is 6 digits, the first and fourth digits are uppercase + numbers, the second digits are uppercase and lowercase, the third and fifth digits are uppercase + digits, and the sixth digit is a number, then the command is as follows:

10.pngOf course, you can also specify the minimum and maximum lengths, as shown in the following image

11.png
3. Custom mode

Earlier, we introduced that hashcat has 8 built-in character sets, but what if the character set you need is not within these 8 types? What to do? It doesn't matter, Hashcat also has a wealth of custom brute force attack modes for everyone.

Using the hashcat –h command, you can see that the following usage patterns are defined

12.pngBelow, let's explain through one example after another:

(1) If the password length is 8 digits and each bit consists of 0123456789aqwcfhj,.<>=-_+, you can use the following commands:

13.pngYou can also write these characters as a file, such as char.txt, using the following command.

14.png(2) If the password length is 8 digits, the first, third, and sixth digits are in "43545yt", the second and fourth digits are in "345dfv-=_+", the fifth and seventh digits are in "9vjnbbf-brg", and the eighth digit is in "345fkfggh", you can use the following commands:

15.pngOf course, you can also write these characters into different files, for example char1.txt、........., use the following command.

16.pngNote: Some symbols have special meanings on the command line, so when there are special symbols in the character set, it is best to write these symbols as files.

(3) On the basis of (2), increase the minimum length and maximum length, such as 4-8 bits. You can use the following commands.

17.png

Third, the use of some parameters

In the previous article, we introduced the use of some parameters, and today, we will move on to some of the commonly used parameters. Today we will focus on the screen display parameters

In the previous article, we introduced the file output command (-o/--outfile-format), which can be used to output the hashcat password decipher to a file in a certain format. But while hashcat is running, we can't see which passwords hashcat has deciphered. If we can directly print the password deciphered by hashcat to the screen in HashCat work, it will be more intuitive and convenient. There are exactly a few parameters in hashcat that can output the hashcat running result to the screen.

1、 --show

The show command will output the deciphered hash and password cached in the pot file to the screen window.

18.png

2、--left

The left command will output the hash value of the hashcat undeciphered to the screen

19.png

3、--stdout

The stdout command does not code-break, but it prints the contents of the dictionary used for code-breaking.

20.png

Fourth, summary

If you want to give full play to the function and role of hashcat, it is recommended that you try more with different commands, so as to be familiar with the combination of different hashcat commands. For the hashcat parameter, you can refer to the hashcat online help (-h).

Previous:Hashcat is a password explosion artifact
Next:Experience sharing of hashcat using GPU acceleration to improve d
欧美午夜精品久久久久久孕妇_日韩一区二区三免费高清在线观看_国产一区二区网址_大桥未久女教师av一区二区_av男人的天堂在线观看_亚洲国产欧美一区_亚洲风情在线资源站_精品视频在线视频_日本电影久久久_欧美顶级毛片在线播放_成人午夜三级_热舞福利精品大尺度视频_成人小视频免费在线观看_亚洲欧洲精品一区二区三区波多野1战4_欧美一区二区三区在线观看视频_日本高清中文字幕在线
一区二区蜜桃| 欧美精品首页| 国产一区精品视频| 国产精品国产亚洲精品看不卡15| 免费a级毛片在线播放| 九九国产精品视频| 久久精品国产亚洲5555| 午夜精品一区二区三区在线视| 国产精品久久国产精品99gif| 欧美日韩免费精品| 伊人久久大香线蕉av一区二区| 欧美中文字幕亚洲一区二区va在线| 国内精品一区二区| 亚洲天天在线日亚洲洲精| 国产精品v欧美精品v日韩| 黄视频在线免费看| 亚洲天堂成人在线| 日韩av一区在线| 国产精品久久久爽爽爽麻豆色哟哟| 九九热线视频只有这里最精品| 亚洲a中文字幕| 国产91精品久久久久久久网曝门| 久久久久91| 亚洲综合清纯丝袜自拍| 九色porny丨入口在线| 99久久99久久精品免费看蜜桃| 国产精品果冻传媒潘| av网页在线| 欧美巨猛xxxx猛交黑人97人| 欧美挤奶吃奶水xxxxx| 欧美va亚洲va| 久久中文欧美| 国产精品一二三区视频| 精品美女久久久| 欧美色图12p| 国产男人精品视频| 日韩三级在线| 国产97在线|亚洲| 三级网站视频在在线播放| 国产成人免费观看| 韩国欧美亚洲国产| 色777狠狠综合秋免鲁丝| 免费大片黄在线观看视频网站| 狠狠操狠狠色综合网| 欧美一区二区三区图| 午夜小视频福利在线观看| 欧美va天堂| 午夜精品剧场| 成人影院入口| 欧美一区自拍| 成人av影音| 成人全视频高清免费观看| 精品美女在线视频| 免费在线中文字幕| 久久只有精品| 精品国产髙清在线看国产毛片| 91精品在线观看入口| 欧美成人在线免费观看| 国产精品一区二区三区四区在线观看| 日韩a一区二区| 国产精品国产三级国产普通话三级| 亚洲jizzjizz日本少妇| 999精品色在线播放| 日韩精品在线网站| 偷拍亚洲欧洲综合| 99久久伊人精品| 99国产欧美另类久久久精品| 开心久久婷婷综合中文字幕| 久久久久久久久丰满| 国产一级成人av| 69久久夜色精品国产7777| 国产视频一区三区| 亚洲日本中文字幕| 国产区在线观看| 99久久自偷自偷国产精品不卡| 国产色婷婷在线| 日韩成人在线电影| 国产日韩欧美| 亚洲成a人v欧美综合天堂麻豆| 亚洲黄在线观看| 国产一区二区三区久久| 狠狠色综合网站久久久久久久| 一区二区三区在线视频播放| 欧美日韩在线另类| 国产精品久久久久久久久久妞妞| 亚洲欧美综合精品久久成人| 在线一区二区三区视频| 国产一区二区三区的电影| 中文字幕视频一区二区三区久| 久久久之久亚州精品露出| 欧美xxxxxx| 国产三区在线成人av| 成人av先锋影音| 老司机一区二区三区| 7777精品伊人久久久大香线蕉| 欧美日韩国产小视频在线观看| 亚洲欧美国产日韩中文字幕| 亚洲wwww| 亚洲一区二区福利| 久久www免费人成精品| 成年人视频在线观看免费| 亚洲午夜色婷婷在线| 精品在线网站观看| 欧美性一区二区| 亚洲一区一卡| 欧美高清在线视频观看不卡| 中文字幕欧美日本乱码一线二线| 成人国产精品一区二区| 玛丽玛丽电影原版免费观看1977| 免费精品视频一区二区三区| 电影一区二区三区| blacked蜜桃精品一区| 日韩国产欧美区| 不卡av在线网| 中文字幕国产亚洲| 2020国产精品小视频| 亚洲淫成人影院| 国产精品亚洲一区二区三区在线观看| 成人精品免费看| japansex久久高清精品| 91久久综合亚洲鲁鲁五月天| 一区二区三区视频免费在线观看| 另类小说视频一区二区| 天堂va蜜桃一区二区三区| 欧美日韩精品久久久| 伊人久久高清| 1024成人网色www| 国产精品免费在线播放| 黄视频网站在线观看| 国产欧美精品国产国产专区| 91tv亚洲精品香蕉国产一区7ujn| 欧美美女在线观看| 日韩欧美1区| 91精品国产综合久久小美女| 精品一区二区三区日本| 西西裸体人体做爰大胆久久久| 91成人国产精品| 中文在线手机av| 2022成人影院| 国产精品免费电影| 精品久久久三级丝袜| 欧美极度另类性三渗透| 亚洲成人av在线| 精品国产第一国产综合精品| 日韩在线观看电影完整版高清免费悬疑悬疑| 久久久www免费人成黑人精品| 97神马电影| 久久综合九色综合97婷婷女人| 欧美日韩精品一区二区视频| 国产成人精品三级高清久久91| 青娱乐一区二区| 久久av资源| 国产鲁鲁视频在线观看特色| 在线免费看h| 91污片在线观看| 在线精品视频小说1| 美女福利精品视频| 99在线观看免费视频精品观看| 日韩国产精品久久| 久久久999精品| 欧美日韩加勒比精品一区| 国产成人黄色av| 日韩欧美另类中文字幕| 欧美成人一区二区三区电影|