mirror of
https://github.com/00xNetrunner/Cheatsheets.git
synced 2025-01-18 14:01:10 +01:00
Update hashcat_cheatsheet.md
This commit is contained in:
parent
0b3ea63111
commit
9ea1f8eb15
1 changed files with 16 additions and 21 deletions
|
@ -1,6 +1,3 @@
|
|||
Thank you for providing the Hashcat cheatsheet in Markdown format! I have formatted it slightly for readability:
|
||||
|
||||
```markdown
|
||||
# 🔓 Hashcat Cheatsheet 🔑
|
||||
|
||||
Hashcat is a powerful password cracking tool. Here are some useful commands and examples:
|
||||
|
@ -8,7 +5,7 @@ Hashcat is a powerful password cracking tool. Here are some useful commands and
|
|||
## Table of Contents
|
||||
|
||||
- [Check GPUs](#check-gpus)
|
||||
- [Hash Types](#hash-types)
|
||||
- [Hash Types](#hash-types)
|
||||
- [Attack Modes](#attack-modes)
|
||||
- [Wordlists](#wordlists)
|
||||
- [Incremental Mode](#incremental-mode)
|
||||
|
@ -17,23 +14,23 @@ Hashcat is a powerful password cracking tool. Here are some useful commands and
|
|||
|
||||
## 🕵️♂️ Check GPUs
|
||||
|
||||
- `hashcat -I` 🖥️
|
||||
- `hashcat -I` 🖥️
|
||||
|
||||
**Note**: Check available GPUs on the system.
|
||||
|
||||
## 🗝️ Hash Types
|
||||
|
||||
- `hashcat -m 0` 🔐
|
||||
- `hashcat -m 0` 🔐
|
||||
|
||||
**Note**: MD5.
|
||||
|
||||
- `hashcat -m 1000` 🔑
|
||||
- `hashcat -m 1000` 🔑
|
||||
|
||||
**Note**: NTLM.
|
||||
|
||||
- `hashcat -m 2500` 🔓
|
||||
|
||||
**Note**: WPA/WPA2.
|
||||
**Note**: WPA/WPA2.
|
||||
|
||||
- `hashcat -m 22000` 🔓
|
||||
|
||||
|
@ -43,7 +40,7 @@ Hashcat is a powerful password cracking tool. Here are some useful commands and
|
|||
|
||||
- `hashcat -a 0` 🗡️
|
||||
|
||||
**Note**: Straight attack.
|
||||
**Note**: Straight attack.
|
||||
|
||||
- `hashcat -a 3` 🛡️
|
||||
|
||||
|
@ -59,15 +56,15 @@ Hashcat is a powerful password cracking tool. Here are some useful commands and
|
|||
|
||||
- `-increment` ♾️
|
||||
|
||||
**Note**: Enable incremental mode.
|
||||
**Note**: Enable incremental mode.
|
||||
|
||||
- `-increment-min 8`
|
||||
- `-increment-min 8`
|
||||
|
||||
**Note**: Set minimum password length.
|
||||
|
||||
- `-increment-max 12`
|
||||
- `-increment-max 12`
|
||||
|
||||
**Note**: Set maximum password length.
|
||||
**Note**: Set maximum password length.
|
||||
|
||||
## 🎯 Custom Charsets
|
||||
|
||||
|
@ -77,22 +74,22 @@ Hashcat is a powerful password cracking tool. Here are some useful commands and
|
|||
|
||||
- `?s` ❇️
|
||||
|
||||
**Note**: Special characters.
|
||||
**Note**: Special characters.
|
||||
|
||||
- `?a` 🎯
|
||||
|
||||
**Note**: All characters (lowercase, uppercase, digits, special).
|
||||
|
||||
## 💡 Examples
|
||||
## 💡 Examples
|
||||
|
||||
### 🚀 Brute force WPA2 PMKID hash:
|
||||
|
||||
```bash
|
||||
hashcat -m 22000 -a 3 hash.hc22000 ?d?d?d?d?d?d?d?d
|
||||
hashcat -m 22000 -a 3 hash.hc22000 ?d?d?d?d?d?d?d?d
|
||||
```
|
||||
|
||||
- `m 22000`: WPA-PMKID-PBKDF2 hash.
|
||||
- `a 3`: Brute-force attack.
|
||||
- `a 3`: Brute-force attack.
|
||||
- `?d?d?d?d?d?d?d?d`: 8-digit brute-force mask.
|
||||
|
||||
### ⚡ Incremental attack on WPA2 hash:
|
||||
|
@ -102,10 +99,8 @@ hashcat -m 22000 hash.hc22000 --increment --increment-min 8 --increment-max 12 ?
|
|||
```
|
||||
|
||||
- `-increment`: Incremental mode.
|
||||
- `-increment-min 8`: Min length 8.
|
||||
- `-increment-max 12`: Max length 12.
|
||||
- `-increment-min 8`: Min length 8.
|
||||
- `-increment-max 12`: Max length 12.
|
||||
- `?d?d?d?d?d?d?d?d?d`: 8-12 digit incremental mask.
|
||||
|
||||
```
|
||||
|
||||
The Markdown formatting looks great! Let me know if you need any other changes.
|
||||
|
|
Loading…
Reference in a new issue