🛠️
Ghoul's Den
WebsiteGhoulsec-Vault
  • Ghoul's Den
  • Index of Tools
  • Index of Links
  • Top Ports
  • Initial Environment Deployment
    • Python3 & Pip Installation
    • Docker 🛳
    • Setting up AWS CLI
    • Msfconsole
    • Netplan configuration & Cloudinit
    • Wordlist Generation - CEWL
    • Apache2 Server
  • Information Gathering & Recon Tools
    • GHDB : Google Hacking Database
    • Sherlock : Social Media Footprinting
    • Nslookup
    • Dig (Domain Information Groper)
    • Recon-ng
    • HTTrack & Web Data Extractor
    • Email Tracker Pro
    • Shodan
    • ARIN Website Registry
  • Network Scanning Enumaration & Vulnerability Detection Tools
    • NMAP & SuperENUM
    • Nmap
      • Target Specification
      • Host Discovery
      • Port Scanning Techniques
      • Port Specification & Scan Order
      • Service Version Detection
      • OS Detection
      • Nmap Scripting Engine
      • Timing & Performance
      • FW / IDS / IPS Evasion
      • Miscellaneous Options
    • Colasoft Packet Builder & Megaping
    • Global Network Inventory
    • LDAP Enumeration > Active Directory Explorer
    • NetBIOS Enumerator
    • SMBEagle
    • RPC Scan
    • Nikto - Web Application Scanner
    • Enum4Linux
  • File Sharing Enumeration
  • Cloud Computing
    • AAD Internals
    • AWS CLI & S3
    • Trivy Scanner
    • S3 Scanner
    • LazyS3
  • Cryptography & stegnography
    • Veracrypt
    • Cryptanalysis Tools
    • Whitespace Cryptography - Snow
    • Creating a Self signed certificate in IIS
    • Steghide & Stegcracker
    • snow
  • Wireless Attacks
    • Aircrack-ng
  • Mobile Attacks
    • PhoneSploit-Pro
    • AndroRAT
    • ADB
  • SQL Injection Vulnerability
    • SQLMap
    • DSSS
  • IOT & OT Hacking
  • Social Engineering
  • Honeypot & IDS
    • Cowrie Honeypot
  • Sniffing & DDos
    • Sniffing
      • Capturing Remote packets using Wireshark
      • Detecting Sniffing using Nmap
    • Denial of Service (Dos & DDos)
      • DDos Protection using DDos Guardian
  • Malware Attacks
  • Password Cracking & Windows exploitation tools
    • Hydra
    • John
    • Hashcat
    • CrackMapExec
    • Impacket
    • Powerview
    • BitsAdmin
    • Rubeus (Kerberoasting) & Winpeas
    • AD-DC Querying
    • mstsc - RDP
  • System hacking & buffer overflow
    • Responder
    • Reverse Shell Generator
    • Clearing Traces
  • Session Hijacking
    • Caido
    • Bettercap
  • Web Servers & Applications
  • Linux Fundamentals
    • Find Command
    • Grep Command
Powered by GitBook
On this page
  1. Password Cracking & Windows exploitation tools

Hashcat

PreviousJohnNextCrackMapExec

Last updated 4 months ago

Hashcat is a powerful and widely-used password cracking tool designed to break various types of password hashes. It supports a broad range of algorithms, including those used in Unix, Windows, and other systems. Hashcat utilizes both CPU and GPU processing power to perform highly efficient brute-force, dictionary, and rainbow table attacks. It is known for its speed and flexibility, enabling users to crack complex passwords much faster compared to traditional tools. Hashcat is popular among security professionals for testing password strength during penetration tests and audits.

Installation:

sudo apt install hashcat

Usage & Manual :

https://hashcat.net/hashcat/
Charactersets : 
?d = Numerical Value (decimal)
?l = lowercase value
?u = uppercase value
?s = symbols
?a = all combined
?b = Hex based password
  • Next step is to define the attack mode & Attack codes can be found on the hashcat wiki page


Use cases & Examples :

  1. Cracking MD5 Hashes

sudo hashcat -a 0 -m 0 hash.txt rockyou.txt
  1. Hashcat Rules based cracking

sudo hashcat -a 0 -m 0 hash.txt rockyou.txt -r hashcat/rule/rockyou-3000.rule
  1. Combination of two or more files

sudo hashcat -a 1 -m 0 hash.txt pass.txt pass1.txt
  1. To show cracked hashes of files

sudo hashcat -a 0 -m 0 hash.txt pass.txt --show
  1. Bruteforcing the hashes

sudo hashcat -a3 -m0 hash.txt
        OR (## for known passtype)
sudo hashcat -a3 -m0 hash.txt ?d?d?d?d 
  1. Example Bruteforcing on password hash : Ghoul@123(MD5)

sudo hashcat -a3 -m0 hash.txt ?u?l?l?l?l?s?d?d?d
  1. Cracking hashes of incremental values

sudo hashcat -a3 -m0 --increment --increment-min 2 --increment-max 10 hash.txt
?d?d?d?d?d?d?d?d?d?d
Basic Syntax of hashcat
Modes of Attack