Hashcat是啥

Hashcat是什么呢?Hashcat是当前最强大的开源密码恢复工具,你可以访问Hashcat.net网站来了解这款工具的详细情况。本质上,Hashcat 3.0是一款高级密码恢复工具,可以利用CPU或GPU资源来攻击160多种哈希类型的密码

计算机环境准备

本地的测试系统为Mac

需要把airodump抓到的 4 次握手文件转换为hccap的格式

txt格式的字典文件

Hashcat和aircrack-ng的对比

使用aricrack-ng暴力破解8位数密码需要50个小时, 但是使用Hashcat只要1个半小时不到

使用aircrac-ng破解密码的时候计算机会爆卡, 内存占用100%是常事, 使用Hashcat破解的时候计算机一点都不卡, Hashcat不但支持CPU破解,还支持GPU破解,利用显卡的计算能力进行极速破解,简直666

即使使用普通的CPU或GPU,每秒也能够生成1.35亿个哈希值, 我这台电脑是Mac Air,破解8位数字需要随机组合68719476736个数字, 这个是千万级别的数字, 使用Hashcat破解只需要1小时40分钟, 平均一秒钟计算1.4个亿密码

Hashcat的安装

先把github上面的源码down到本地:

git clone https://github.com/hashcat/hashcat.git

然后生成项目:

cd hashcat //进入目录

sudo make

sudo make install //安装hashcat

如果安装成功, 在命令行输入hashcat,即可看到帮助文档:

hashcat, advanced password recovery

Usage: hashcat [options]... hash|hashfile|hccapfile [dictionary|mask|directory]...

- [ Options ] -

Options Short / Long | Type | Description | Example

===============================+======+======================================================+=======================

-m, --hash-type | Num | Hash-type, see references below | -m 1000

-a, --attack-mode | Num | Attack-mode, see references below | -a 3

-V, --version | | Print version |

-h, --help | | Print help |

--quiet | | Suppress output |

--hex-charset | | Assume charset is given in hex |

--hex-salt | | Assume salt is given in hex |

--hex-wordlist | | Assume words in wordlist is given in hex |

--force | | Ignore warnings |

--status | | Enable automatic update of the status-screen |

--status-timer | Num | Sets seconds between status-screen update to X | --status-timer=1

--machine-readable | | Display the status view in a machine readable format |

--keep-guessing | | Keep guessing the hash after it has been cracked |

--loopback | | Add new plains to induct directory |

--weak-hash-threshold | Num | Threshold X when to stop checking for weak hashes | --weak=0

--markov-hcstat | File | Specify hcstat file to use | --markov-hc=my.hcstat

--markov-disable | | Disables markov-chains, emulates classic brute-force |

--markov-classic | | Enables classic markov-chains, no per-position |

-t, --markov-threshold | Num | Threshold X when to stop accepting new markov-chains | -t 50

--runtime | Num | Abort session after X seconds of runtime | --runtime=10

--session | Str | Define specific session name | --session=mysession

--restore | | Restore session from --session |

--restore-disable | | Do not write restore file |

--restore-file-path | File | Specific path to restore file | --restore-file-path=my.restore

-o, --outfile | File | Define outfile for recovered hash | -o outfile.txt

--outfile-format | Num | Define outfile-format X for recovered hash | --outfile-format=7

--outfile-autohex-disable | | Disable the use of $HEX[] in output plains |

--outfile-check-timer | Num | Sets seconds between outfile checks to X | --outfile-check=30

-p, --separator | Char | Separator char for hashlists and outfile | -p :

--stdout | | Do not crack a hash, instead print candidates only |

--show | | Compare hashlist with potfile; Show cracked hashes |

--left | | Compare hashlist with potfile; Show uncracked hashes |

--username | | Enable ignoring of usernames in hashfile |

--remove | | Enable remove of hash once it is cracked |

--remove-timer | Num | Update input hash file each X seconds | --remove-timer=30

--potfile-disable | | Do not write potfile |

--potfile-path | Dir | Specific path to potfile | --potfile-path=my.pot

--debug-mode | Num | Defines the debug mode (hybrid only by using rules) | --debug-mode=4

--debug-file | File | Output file for debugging rules | --debug-file=good.log

--induction-dir | Dir | Specify the induction directory to use for loopback | --induction=inducts

--outfile-check-dir | Dir | Specify the outfile directory to monitor for plains | --outfile-check-dir=x

--logfile-disable | | Disable the logfile |

--truecrypt-keyfiles | File | Keyfiles used, separate with comma | --truecrypt-key=x.png

--veracrypt-keyfiles | File | Keyfiles used, separate with comma | --veracrypt-key=x.txt

--veracrypt-pim | Num | VeraCrypt personal iterations multiplier | --veracrypt-pim=1000

-b, --benchmark | | Run benchmark |

--speed-only | | Return expected speed of the attack and quit |

--progress-only | | Return ideal progress step size and time to process |

-c, --segment-size | Num | Sets size in MB to cache from the wordfile to X | -c 32

--bitmap-min | Num | Sets minimum bits allowed for bitmaps to X | --bitmap-min=24

--bitmap-max | Num | Sets maximum bits allowed for bitmaps to X | --bitmap-max=24

--cpu-affinity | Str | Locks to CPU devices, separate with comma | --cpu-affinity=1,2,3

-I, --opencl-info | | Show info about OpenCL platforms/devices detected | -I

--opencl-platforms | Str | OpenCL platforms to use, separate with comma | --opencl-platforms=2

-d, --opencl-devices | Str | OpenCL devices to use, separate with comma | -d 1

-D, --opencl-device-types | Str | OpenCL device-types to use, separate with comma | -D 1

--opencl-vector-width | Num | Manual override OpenCL vector-width to X | --opencl-vector=4

-w, --workload-profile | Num | Enable a specific workload profile, see pool below | -w 3

-n, --kernel-accel | Num | Manual workload tuning, set outerloop step size to X | -n 64

-u, --kernel-loops | Num | Manual workload tuning, set innerloop step size to X | -u 256

--nvidia-spin-damp | Num | Workaround NVidias CPU burning loop bug, in percent | --nvidia-spin-damp=50

--gpu-temp-disable | | Disable temperature and fanspeed reads and triggers |

--gpu-temp-abort | Num | Abort if GPU temperature reaches X degrees celsius | --gpu-temp-abort=100

--gpu-temp-retain | Num | Try to retain GPU temperature at X degrees celsius | --gpu-temp-retain=95

--powertune-enable | | Enable power tuning, restores settings when finished |

--scrypt-tmto | Num | Manually override TMTO value for scrypt to X | --scrypt-tmto=3

-s, --skip | Num | Skip X words from the start | -s 1000000

-l, --limit | Num | Limit X words from the start + skipped words | -l 1000000

--keyspace | | Show keyspace base:mod values and quit |

-j, --rule-left | Rule | Single rule applied to each word from left wordlist | -j 'c'

-k, --rule-right | Rule | Single rule applied to each word from right wordlist | -k '^-'

-r, --rules-file | File | Multiple rules applied to each word from wordlists | -r rules/best64.rule

-g, --generate-rules | Num | Generate X random rules | -g 10000

--generate-rules-func-min | Num | Force min X funcs per rule |

--generate-rules-func-max | Num | Force max X funcs per rule |

--generate-rules-seed | Num | Force RNG seed set to X |

-1, --custom-charset1 | CS | User-defined charset ?1 | -1 ?l?d?u

-2, --custom-charset2 | CS | User-defined charset ?2 | -2 ?l?d?s

-3, --custom-charset3 | CS | User-defined charset ?3 |

-4, --custom-charset4 | CS | User-defined charset ?4 |

-i, --increment | | Enable mask increment mode |

--increment-min | Num | Start mask incrementing at X | --increment-min=4

--increment-max | Num | Stop mask incrementing at X | --increment-max=8

- [ Hash modes ] -

# | Name | Category

======+==================================================+======================================

900 | MD4 | Raw Hash

0 | MD5 | Raw Hash

5100 | Half MD5 | Raw Hash

100 | SHA1 | Raw Hash

1300 | SHA-224 | Raw Hash

1400 | SHA-256 | Raw Hash

10800 | SHA-384 | Raw Hash

1700 | SHA-512 | Raw Hash

5000 | SHA-3(Keccak) | Raw Hash

10100 | SipHash | Raw Hash

6000 | RipeMD160 | Raw Hash

6100 | Whirlpool | Raw Hash

6900 | GOST R 34.11-94 | Raw Hash

11700 | GOST R 34.11-2012 (Streebog) 256-bit | Raw Hash

11800 | GOST R 34.11-2012 (Streebog) 512-bit | Raw Hash

10 | md5($pass.$salt) | Raw Hash, Salted and / or Iterated

20 | md5($salt.$pass) | Raw Hash, Salted and / or Iterated

30 | md5(unicode($pass).$salt) | Raw Hash, Salted and / or Iterated

40 | md5($salt.unicode($pass)) | Raw Hash, Salted and / or Iterated

3800 | md5($salt.$pass.$salt) | Raw Hash, Salted and / or Iterated

3710 | md5($salt.md5($pass)) | Raw Hash, Salted and / or Iterated

2600 | md5(md5($pass)) | Raw Hash, Salted and / or Iterated

4300 | md5(strtoupper(md5($pass))) | Raw Hash, Salted and / or Iterated

4400 | md5(sha1($pass)) | Raw Hash, Salted and / or Iterated

110 | sha1($pass.$salt) | Raw Hash, Salted and / or Iterated

120 | sha1($salt.$pass) | Raw Hash, Salted and / or Iterated

130 | sha1(unicode($pass).$salt) | Raw Hash, Salted and / or Iterated

140 | sha1($salt.unicode($pass)) | Raw Hash, Salted and / or Iterated

4500 | sha1(sha1($pass)) | Raw Hash, Salted and / or Iterated

4520 | sha1($salt.sha1($pass)) | Raw Hash, Salted and / or Iterated

4700 | sha1(md5($pass)) | Raw Hash, Salted and / or Iterated

4900 | sha1($salt.$pass.$salt) | Raw Hash, Salted and / or Iterated

14400 | sha1(CX) | Raw Hash, Salted and / or Iterated

1410 | sha256($pass.$salt) | Raw Hash, Salted and / or Iterated

1420 | sha256($salt.$pass) | Raw Hash, Salted and / or Iterated

1430 | sha256(unicode($pass).$salt) | Raw Hash, Salted and / or Iterated

1440 | sha256($salt.unicode($pass)) | Raw Hash, Salted and / or Iterated

1710 | sha512($pass.$salt) | Raw Hash, Salted and / or Iterated

1720 | sha512($salt.$pass) | Raw Hash, Salted and / or Iterated

1730 | sha512(unicode($pass).$salt) | Raw Hash, Salted and / or Iterated

1740 | sha512($salt.unicode($pass)) | Raw Hash, Salted and / or Iterated

50 | HMAC-MD5 (key = $pass) | Raw Hash, Authenticated

60 | HMAC-MD5 (key = $salt) | Raw Hash, Authenticated

150 | HMAC-SHA1 (key = $pass) | Raw Hash, Authenticated

160 | HMAC-SHA1 (key = $salt) | Raw Hash, Authenticated

1450 | HMAC-SHA256 (key = $pass) | Raw Hash, Authenticated

1460 | HMAC-SHA256 (key = $salt) | Raw Hash, Authenticated

1750 | HMAC-SHA512 (key = $pass) | Raw Hash, Authenticated

1760 | HMAC-SHA512 (key = $salt) | Raw Hash, Authenticated

14000 | DES (PT = $salt, key = $pass) | Raw Cipher, Known-Plaintext attack

14100 | 3DES (PT = $salt, key = $pass) | Raw Cipher, Known-Plaintext attack

14900 | Skip32 (PT = $salt, key = $pass) | Raw Cipher, Known-Plaintext attack

400 | phpass | Generic KDF

8900 | scrypt | Generic KDF

11900 | PBKDF2-HMAC-MD5 | Generic KDF

12000 | PBKDF2-HMAC-SHA1 | Generic KDF

10900 | PBKDF2-HMAC-SHA256 | Generic KDF

12100 | PBKDF2-HMAC-SHA512 | Generic KDF

23 | Skype | Network protocols

2500 | WPA/WPA2 | Network protocols

4800 | iSCSI CHAP authentication, MD5(Chap) | Network protocols

5300 | IKE-PSK MD5 | Network protocols

5400 | IKE-PSK SHA1 | Network protocols

5500 | NetNTLMv1 | Network protocols

5500 | NetNTLMv1 + ESS | Network protocols

5600 | NetNTLMv2 | Network protocols

7300 | IPMI2 RAKP HMAC-SHA1 | Network protocols

7500 | Kerberos 5 AS-REQ Pre-Auth etype 23 | Network protocols

8300 | DNSSEC (NSEC3) | Network protocols

10200 | Cram MD5 | Network protocols

11100 | PostgreSQL CRAM (MD5) | Network protocols

11200 | MySQL CRAM (SHA1) | Network protocols

11400 | SIP digest authentication (MD5) | Network protocols

13100 | Kerberos 5 TGS-REP etype 23 | Network protocols

121 | SMF (Simple Machines Forum) | Forums, CMS, E-Commerce, Frameworks

400 | phpBB3 | Forums, CMS, E-Commerce, Frameworks

2611 | vBulletin < v3.8.5 | Forums, CMS, E-Commerce, Frameworks

2711 | vBulletin > v3.8.5 | Forums, CMS, E-Commerce, Frameworks

2811 | MyBB | Forums, CMS, E-Commerce, Frameworks

2811 | IPB (Invison Power Board) | Forums, CMS, E-Commerce, Frameworks

8400 | WBB3 (Woltlab Burning Board) | Forums, CMS, E-Commerce, Frameworks

11 | Joomla < 2.5.18 | Forums, CMS, E-Commerce, Frameworks

400 | Joomla > 2.5.18 | Forums, CMS, E-Commerce, Frameworks

400 | Wordpress | Forums, CMS, E-Commerce, Frameworks

2612 | PHPS | Forums, CMS, E-Commerce, Frameworks

7900 | Drupal7 | Forums, CMS, E-Commerce, Frameworks

21 | osCommerce | Forums, CMS, E-Commerce, Frameworks

21 | xt:Commerce | Forums, CMS, E-Commerce, Frameworks

11000 | PrestaShop | Forums, CMS, E-Commerce, Frameworks

124 | Django (SHA-1) | Forums, CMS, E-Commerce, Frameworks

10000 | Django (PBKDF2-SHA256) | Forums, CMS, E-Commerce, Frameworks

3711 | Mediawiki B type | Forums, CMS, E-Commerce, Frameworks

13900 | OpenCart | Forums, CMS, E-Commerce, Frameworks

4521 | Redmine | Forums, CMS, E-Commerce, Frameworks

4522 | PunBB | Forums, CMS, E-Commerce, Frameworks

12 | PostgreSQL | Database Server

131 | MSSQL(2000) | Database Server

132 | MSSQL(2005) | Database Server

1731 | MSSQL(2012) | Database Server

1731 | MSSQL(2014) | Database Server

200 | MySQL323 | Database Server

300 | MySQL4.1/MySQL5 | Database Server

3100 | Oracle H: Type (Oracle 7+) | Database Server

112 | Oracle S: Type (Oracle 11+) | Database Server

12300 | Oracle T: Type (Oracle 12+) | Database Server

8000 | Sybase ASE | Database Server

141 | EPiServer 6.x < v4 | HTTP, SMTP, LDAP Server

1441 | EPiServer 6.x > v4 | HTTP, SMTP, LDAP Server

1600 | Apache $apr1$ | HTTP, SMTP, LDAP Server

12600 | ColdFusion 10+ | HTTP, SMTP, LDAP Server

1421 | hMailServer | HTTP, SMTP, LDAP Server

101 | nsldap, SHA-1(Base64), Netscape LDAP SHA | HTTP, SMTP, LDAP Server

111 | nsldaps, SSHA-1(Base64), Netscape LDAP SSHA | HTTP, SMTP, LDAP Server

1411 | SSHA-256(Base64), LDAP {SSHA256} | HTTP, SMTP, LDAP Server

1711 | SSHA-512(Base64), LDAP {SSHA512} | HTTP, SMTP, LDAP Server

11500 | CRC32 | Checksums

3000 | LM | Operating-Systems

1000 | NTLM | Operating-Systems

1100 | Domain Cached Credentials (DCC), MS Cache | Operating-Systems

2100 | Domain Cached Credentials 2 (DCC2), MS Cache 2 | Operating-Systems

12800 | MS-AzureSync PBKDF2-HMAC-SHA256 | Operating-Systems

1500 | descrypt, DES(Unix), Traditional DES | Operating-Systems

12400 | BSDiCrypt, Extended DES | Operating-Systems

500 | md5crypt $1$, MD5(Unix) | Operating-Systems

3200 | bcrypt $2*$, Blowfish(Unix) | Operating-Systems

7400 | sha256crypt $5$, SHA256(Unix) | Operating-Systems

1800 | sha512crypt $6$, SHA512(Unix) | Operating-Systems

122 | OSX v10.4, OSX v10.5, OSX v10.6 | Operating-Systems

1722 | OSX v10.7 | Operating-Systems

7100 | OSX v10.8, OSX v10.9, OSX v10.10 | Operating-Systems

6300 | AIX {smd5} | Operating-Systems

6700 | AIX {ssha1} | Operating-Systems

6400 | AIX {ssha256} | Operating-Systems

6500 | AIX {ssha512} | Operating-Systems

2400 | Cisco-PIX | Operating-Systems

2410 | Cisco-ASA | Operating-Systems

500 | Cisco-IOS $1$ | Operating-Systems

5700 | Cisco-IOS $4$ | Operating-Systems

9200 | Cisco-IOS $8$ | Operating-Systems

9300 | Cisco-IOS $9$ | Operating-Systems

22 | Juniper Netscreen/SSG (ScreenOS) | Operating-Systems

501 | Juniper IVE | Operating-Systems

7000 | Fortigate (FortiOS) | Operating-Systems

5800 | Android PIN | Operating-Systems

13800 | Windows 8+ phone PIN/Password | Operating-Systems

8100 | Citrix Netscaler | Operating-Systems

8500 | RACF | Operating-Systems

7200 | GRUB 2 | Operating-Systems

9900 | Radmin2 | Operating-Systems

125 | ArubaOS | Operating-Systems

7700 | SAP CODVN B (BCODE) | Enterprise Application Software (EAS)

7800 | SAP CODVN F/G (PASSCODE) | Enterprise Application Software (EAS)

10300 | SAP CODVN H (PWDSALTEDHASH) iSSHA-1 | Enterprise Application Software (EAS)

8600 | Lotus Notes/Domino 5 | Enterprise Application Software (EAS)

8700 | Lotus Notes/Domino 6 | Enterprise Application Software (EAS)

9100 | Lotus Notes/Domino 8 | Enterprise Application Software (EAS)

133 | PeopleSoft | Enterprise Application Software (EAS)

13500 | PeopleSoft Token | Enterprise Application Software (EAS)

11600 | 7-Zip | Archives

12500 | RAR3-hp | Archives

13000 | RAR5 | Archives

13200 | AxCrypt | Archives

13300 | AxCrypt in memory SHA1 | Archives

13600 | WinZip | Archives

14700 | iTunes Backup < 10.0 | Backup

14800 | iTunes Backup >= 10.0 | Backup

62XY | TrueCrypt | Full-Disk encryptions (FDE)

X | 1 = PBKDF2-HMAC-RipeMD160 | Full-Disk encryptions (FDE)

X | 2 = PBKDF2-HMAC-SHA512 | Full-Disk encryptions (FDE)

X | 3 = PBKDF2-HMAC-Whirlpool | Full-Disk encryptions (FDE)

X | 4 = PBKDF2-HMAC-RipeMD160 + boot-mode | Full-Disk encryptions (FDE)

Y | 1 = XTS 512 bit pure AES | Full-Disk encryptions (FDE)

Y | 1 = XTS 512 bit pure Serpent | Full-Disk encryptions (FDE)

Y | 1 = XTS 512 bit pure Twofish | Full-Disk encryptions (FDE)

Y | 2 = XTS 1024 bit pure AES | Full-Disk encryptions (FDE)

Y | 2 = XTS 1024 bit pure Serpent | Full-Disk encryptions (FDE)

Y | 2 = XTS 1024 bit pure Twofish | Full-Disk encryptions (FDE)

Y | 2 = XTS 1024 bit cascaded AES-Twofish | Full-Disk encryptions (FDE)

Y | 2 = XTS 1024 bit cascaded Serpent-AES | Full-Disk encryptions (FDE)

Y | 2 = XTS 1024 bit cascaded Twofish-Serpent | Full-Disk encryptions (FDE)

Y | 3 = XTS 1536 bit all | Full-Disk encryptions (FDE)

8800 | Android FDE < v4.3 | Full-Disk encryptions (FDE)

12900 | Android FDE (Samsung DEK) | Full-Disk encryptions (FDE)

12200 | eCryptfs | Full-Disk encryptions (FDE)

137XY | VeraCrypt | Full-Disk encryptions (FDE)

X | 1 = PBKDF2-HMAC-RipeMD160 | Full-Disk encryptions (FDE)

X | 2 = PBKDF2-HMAC-SHA512 | Full-Disk encryptions (FDE)

X | 3 = PBKDF2-HMAC-Whirlpool | Full-Disk encryptions (FDE)

X | 4 = PBKDF2-HMAC-RipeMD160 + boot-mode | Full-Disk encryptions (FDE)

X | 5 = PBKDF2-HMAC-SHA256 | Full-Disk encryptions (FDE)

X | 6 = PBKDF2-HMAC-SHA256 + boot-mode | Full-Disk encryptions (FDE)

Y | 1 = XTS 512 bit pure AES | Full-Disk encryptions (FDE)

Y | 1 = XTS 512 bit pure Serpent | Full-Disk encryptions (FDE)

Y | 1 = XTS 512 bit pure Twofish | Full-Disk encryptions (FDE)

Y | 2 = XTS 1024 bit pure AES | Full-Disk encryptions (FDE)

Y | 2 = XTS 1024 bit pure Serpent | Full-Disk encryptions (FDE)

Y | 2 = XTS 1024 bit pure Twofish | Full-Disk encryptions (FDE)

Y | 2 = XTS 1024 bit cascaded AES-Twofish | Full-Disk encryptions (FDE)

Y | 2 = XTS 1024 bit cascaded Serpent-AES | Full-Disk encryptions (FDE)

Y | 2 = XTS 1024 bit cascaded Twofish-Serpent | Full-Disk encryptions (FDE)

Y | 3 = XTS 1536 bit all | Full-Disk encryptions (FDE)

14600 | LUKS | Full-Disk encryptions (FDE)

9700 | MS Office <= 2003 $0|$1, MD5 + RC4 | Documents

9710 | MS Office <= 2003 $0|$1, MD5 + RC4, collider #1 | Documents

9720 | MS Office <= 2003 $0|$1, MD5 + RC4, collider #2 | Documents

9800 | MS Office <= 2003 $3|$4, SHA1 + RC4 | Documents

9810 | MS Office <= 2003 $3|$4, SHA1 + RC4, collider #1 | Documents

9820 | MS Office <= 2003 $3|$4, SHA1 + RC4, collider #2 | Documents

9400 | MS Office 2007 | Documents

9500 | MS Office 2010 | Documents

9600 | MS Office 2013 | Documents

10400 | PDF 1.1 - 1.3 (Acrobat 2 - 4) | Documents

10410 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #1 | Documents

10420 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #2 | Documents

10500 | PDF 1.4 - 1.6 (Acrobat 5 - 8) | Documents

10600 | PDF 1.7 Level 3 (Acrobat 9) | Documents

10700 | PDF 1.7 Level 8 (Acrobat 10 - 11) | Documents

9000 | Password Safe v2 | Password Managers

5200 | Password Safe v3 | Password Managers

6800 | Lastpass + Lastpass sniffed | Password Managers

6600 | 1Password, agilekeychain | Password Managers

8200 | 1Password, cloudkeychain | Password Managers

11300 | Bitcoin/Litecoin wallet.dat | Password Managers

12700 | Blockchain, My Wallet | Password Managers

13400 | Keepass 1 (AES/Twofish) and Keepass 2 (AES) | Password Managers

99999 | Plaintext | Plaintext

- [ Outfile Formats ] -

# | Format

===+========

1 | hash[:salt]

2 | plain

3 | hash[:salt]:plain

4 | hex_plain

5 | hash[:salt]:hex_plain

6 | plain:hex_plain

7 | hash[:salt]:plain:hex_plain

8 | crackpos

9 | hash[:salt]:crack_pos

10 | plain:crack_pos

11 | hash[:salt]:plain:crack_pos

12 | hex_plain:crack_pos

13 | hash[:salt]:hex_plain:crack_pos

14 | plain:hex_plain:crack_pos

15 | hash[:salt]:plain:hex_plain:crack_pos

- [ Rule Debugging Modes ] -

# | Format

===+========

1 | Finding-Rule

2 | Original-Word

3 | Original-Word:Finding-Rule

4 | Original-Word:Finding-Rule:Processed-Word

- [ Attack Modes ] -

# | Mode

===+======

0 | Straight

1 | Combination

3 | Brute-force

6 | Hybrid Wordlist + Mask

7 | Hybrid Mask + Wordlist

- [ Built-in Charsets ] -

? | Charset

===+=========

l | abcdefghijklmnopqrstuvwxyz

u | ABCDEFGHIJKLMNOPQRSTUVWXYZ

d | 0123456789

h | 0123456789abcdef

H | 0123456789ABCDEF

s | !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~

a | ?l?u?d?s

b | 0x00 - 0xff

- [ OpenCL Device Types ] -

# | Device Type

===+=============

1 | CPU

2 | GPU

3 | FPGA, DSP, Co-Processor

- [ Workload Profiles ] -

# | Performance | Runtime | Power Consumption | Desktop Impact

===+=============+=========+===================+=================

1 | Low | 2 ms | Low | Minimal

2 | Default | 12 ms | Economic | Noticeable

3 | High | 96 ms | High | Unresponsive

4 | Nightmare | 480 ms | Insane | Headless

- [ Basic Examples ] -

Attack- | Hash- |

Mode | Type | Example command

==================+=======+==================================================================

Wordlist | $P$ | hashcat -a 0 -m 400 example400.hash example.dict

Wordlist + Rules | MD5 | hashcat -a 0 -m 0 example0.hash example.dict -r rules/best64.rule

Brute-Force | MD5 | hashcat -a 3 -m 0 example0.hash ?a?a?a?a?a?a

Combinator | MD5 | hashcat -a 1 -m 0 example0.hash example.dict example.dict

If you still have no idea what just happened try following pages:

* https://hashcat.net/wiki/#howtos_videos_papers_articles_etc_in_the_wild

* https://hashcat.net/wiki/#frequently_asked_questions

View Code

使用Hashcat破解WPA/PSK密码

首先要把airodump抓取的cap文件转化为hccap格式, 可以在线转换, 在线转换的地址:https://hashcat.net/cap2hccap/, 也可以用aircrack-ng转换

aircrack-ng -J

使用hashcat命令,第一个参数: -m 2500为破解的模式为WPA/PSK方式 ,第二个参数: hccap格式的文件是刚刚转化好的文件, 第三个参数: dics.txt为字典文件 :

hashcat -m 2500 out.hccap.hccap dics.txt

破解的进度通过按键盘上的 s 键即可查看:

破纯数字密码

hashcat -m 2500 -a 3 handshake.hccap ?d?d?d?d?d?d?d?d

?d?d?d?d?d?d?d?d代表8为数字

使用crunch生成字典破解

kali系统中,通过crunch生成字典, 我要生成8位纯数字的字典,使用以下命令, 8 8 代表最小位数为8为, 第二个8代表最大位数也为8为, 0123456789为字典中的数字 , -o dic.txt说明要把字典生成到dic.txt, 生成的纯数字字典有900M:

crunch 8 8 0123456789 -o dic.txt

最后祝你好运,6666

参考:

hashcat官网:https://hashcat.net/hashcat/

Cracking WPA/WPA2 with oclHashcat:https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2

在线cap转为hccapx格式:https://hashcat.net/cap2hccapx/

git:https://github.com/hashcat/hashcat

0-9 8位纯数密码.rar:http://vdisk.weibo.com/s/v3c8-ph-6IAK/1438713183

作者: NONO

出处:http://www.cnblogs.com/diligenceday/

企业网站:http://www.idrwl.com/ 开源博客:http://www.github.com/sqqihao

QQ:287101329

微信:18101055830

2025-07-04 02:52:22