Cyb3rShot Posted January 13 Share Posted January 13 Hashcat is an advanced free (License: MIT) multi-threaded password recovery tool and it is world's fastest password cracker and recovery utility, which supports multiple unique attack modes of attacks for more than 200 highly optimized hashing algorithms. Hashcat currently supports CPUs and GPUs and other hardware accelerators on Linux, Windows, and OSX, and has facilities to help enable distributed password cracking. Hashcat comes pre-installed on our Kali Linux system, So we don't need to install it, but if installation is required we can use sudo apt install hashcat command. Features of Hashcat World's fastest password cracker. World's first and only in-kernel rule engine. Free and open source. Multi-OS (Linux, Windows and macOS). Multi-Platform (CPU, GPU, APU, etc., everything that comes with an OpenCL runtime). Multi-Hash (Cracking multiple hashes at the same time). Multi-Devices (Utilizing multiple devices in same system). Multi-Device-Types (Utilizing mixed device types in same system). Supports password candidate brain functionality. Supports distributed cracking networks (using overlay). Supports interactive pause / resume. Supports sessions. Supports restore. Supports reading password candidates from file and stdin. Supports hex-salt and hex-charset. Supports automatic performance tuning. Supports automatic keyspace ordering markov-chains. Built-in benchmarking system. Integrated thermal watchdog. 350+ Hash-types implemented with performance in mind. ... and much more. Hashcat offers multiple unique attack modes for cracking passwords. Those are following: Brute-Force attack Combinator attack Dictionary attack Fingerprint attack Hybrid attack Mask attack Permutation attack Rule-based attack Table-Lookup attack Toggle-Case attack PRINCE attack Now without wasting any more time lets dive into Hashcat. Hashcat on Kali Linux As we told Hashcat comes pre-installed with a Kali Linux and it is multi-threaded so first let we benchmark our system by using following command: hashcat -b In the following screenshot we can see the benchmark of our system and get an idea how it can perform while cracking various types of hashes. Here we can get an idea about the performance of our system. Let's run this tool to crack some hashes. Here we have collected some hashed on a text file. For educational purposes we just generated these hashed not collected from any website's database. Now we can crack these using Hashcat, and store the output in a craced.txt file by applying following command: hashcat -m 0 -a 0 -o cracked.txt hashes.txt /usr/share/seclists/Passwords/Common-Credentials/10k-most-common.txt Let's discuss about the above command, in this command we have used -m flag to specify the hash type, -a for attack mode and -o for output file, here we named our output file 'cracked.txt', then we give the target hash file to crack named 'hashes.txt', at last we specify the wordlist file to be used. In the following screenshot we can see that hashcat finishes the cracking job. Let's see our output file (cracked.txt). In the above screenshot we can see that hashcat cracked the hashes. Here for the new readers, in this attack mode we can crack those password hashes if the plaintext of the hashes is available in the wordlist file. Using bigger wordlist file will increase the chance to crack hashes. 1 Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now