Update hashcat_cheatsheet.md

main
$./Netrunner_& 1 year ago committed by GitHub
parent 0b3ea63111
commit 9ea1f8eb15
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -1,6 +1,3 @@
Thank you for providing the Hashcat cheatsheet in Markdown format! I have formatted it slightly for readability:
```markdown
# 🔓 Hashcat Cheatsheet 🔑 # 🔓 Hashcat Cheatsheet 🔑
Hashcat is a powerful password cracking tool. Here are some useful commands and examples: Hashcat is a powerful password cracking tool. Here are some useful commands and examples:
@ -8,7 +5,7 @@ Hashcat is a powerful password cracking tool. Here are some useful commands and
## Table of Contents ## Table of Contents
- [Check GPUs](#check-gpus) - [Check GPUs](#check-gpus)
- [Hash Types](#hash-types) - [Hash Types](#hash-types)
- [Attack Modes](#attack-modes) - [Attack Modes](#attack-modes)
- [Wordlists](#wordlists) - [Wordlists](#wordlists)
- [Incremental Mode](#incremental-mode) - [Incremental Mode](#incremental-mode)
@ -17,23 +14,23 @@ Hashcat is a powerful password cracking tool. Here are some useful commands and
## 🕵️‍♂️ Check GPUs ## 🕵️‍♂️ Check GPUs
- `hashcat -I` 🖥️ - `hashcat -I` 🖥️
**Note**: Check available GPUs on the system. **Note**: Check available GPUs on the system.
## 🗝️ Hash Types ## 🗝️ Hash Types
- `hashcat -m 0` 🔐 - `hashcat -m 0` 🔐
**Note**: MD5. **Note**: MD5.
- `hashcat -m 1000` 🔑 - `hashcat -m 1000` 🔑
**Note**: NTLM. **Note**: NTLM.
- `hashcat -m 2500` 🔓 - `hashcat -m 2500` 🔓
**Note**: WPA/WPA2. **Note**: WPA/WPA2.
- `hashcat -m 22000` 🔓 - `hashcat -m 22000` 🔓
@ -43,7 +40,7 @@ Hashcat is a powerful password cracking tool. Here are some useful commands and
- `hashcat -a 0` 🗡️ - `hashcat -a 0` 🗡️
**Note**: Straight attack. **Note**: Straight attack.
- `hashcat -a 3` 🛡️ - `hashcat -a 3` 🛡️
@ -59,15 +56,15 @@ Hashcat is a powerful password cracking tool. Here are some useful commands and
- `-increment` ♾️ - `-increment` ♾️
**Note**: Enable incremental mode. **Note**: Enable incremental mode.
- `-increment-min 8` - `-increment-min 8`
**Note**: Set minimum password length. **Note**: Set minimum password length.
- `-increment-max 12` - `-increment-max 12`
**Note**: Set maximum password length. **Note**: Set maximum password length.
## 🎯 Custom Charsets ## 🎯 Custom Charsets
@ -77,22 +74,22 @@ Hashcat is a powerful password cracking tool. Here are some useful commands and
- `?s` ❇️ - `?s` ❇️
**Note**: Special characters. **Note**: Special characters.
- `?a` 🎯 - `?a` 🎯
**Note**: All characters (lowercase, uppercase, digits, special). **Note**: All characters (lowercase, uppercase, digits, special).
## 💡 Examples ## 💡 Examples
### 🚀 Brute force WPA2 PMKID hash: ### 🚀 Brute force WPA2 PMKID hash:
```bash ```bash
hashcat -m 22000 -a 3 hash.hc22000 ?d?d?d?d?d?d?d?d hashcat -m 22000 -a 3 hash.hc22000 ?d?d?d?d?d?d?d?d
``` ```
- `m 22000`: WPA-PMKID-PBKDF2 hash. - `m 22000`: WPA-PMKID-PBKDF2 hash.
- `a 3`: Brute-force attack. - `a 3`: Brute-force attack.
- `?d?d?d?d?d?d?d?d`: 8-digit brute-force mask. - `?d?d?d?d?d?d?d?d`: 8-digit brute-force mask.
### ⚡ Incremental attack on WPA2 hash: ### ⚡ Incremental attack on WPA2 hash:
@ -102,10 +99,8 @@ hashcat -m 22000 hash.hc22000 --increment --increment-min 8 --increment-max 12 ?
``` ```
- `-increment`: Incremental mode. - `-increment`: Incremental mode.
- `-increment-min 8`: Min length 8. - `-increment-min 8`: Min length 8.
- `-increment-max 12`: Max length 12. - `-increment-max 12`: Max length 12.
- `?d?d?d?d?d?d?d?d?d`: 8-12 digit incremental mask. - `?d?d?d?d?d?d?d?d?d`: 8-12 digit incremental mask.
``` ```
The Markdown formatting looks great! Let me know if you need any other changes.

Loading…
Cancel
Save