Hashcat#
Similar to John The Ripper, Hashcat is used for well… hashes…. Unlike John however, hashcat requires that you define the mode (hash type) and attack method.
Running Hashcat#
hashcat -m [the mode number] -a [the attack method] [the file with hashes listed] [a wordlist or charset]
hashcat -m [the mode number] -a [the attack method] [the single hash value] [a wordlist or charset]
The file could include salts as well, depending on the mode number defined.
There is also a useful tool for Identifying the hashes: HashID
There are a LOT of modes (hash types) that can be cracked. To see the list
hashcat -h
0: MD5
100: SHA1
1800: sha512crypt
The attack modes are easier, theres only 5
0 : Straight
1 : Combination
3 : Brute-Force (this includes dictionary)
6 : Hybrid Wordlist + Mask
7 : Hybrid Mask + Wordlist
Formatting of Hash File#
It can be frustrating getting the hashes in the right format, but Hashcat includes a method for this too, where it gives what is expected in the hash file
Example Commands#
Single Hash, Type SHA-1, against RockYou#
hashcat -m 100 -a 3 8d6e34f987851aa599257d3831a1af040886842f /usr/share/seclists/Passwords/Leaked-databases/rockyou.txt
Spoiler: sunshine
Single Hash, Type MD5, 4 Digits longs#
hashcat -m 0 -a 3 e48e13207341b6bffb7fb1622282247b ?d?d?d?d
Spoiler: 1337