Here $TYPE
is the hash type (check man hashcat
), and -O
requests that Hashcat use an optimized kernel (faster, but limited in the password length that can be cracked). Note that instead of $HASHFILE
, a raw hash can be provided directly instead (the hash-identifier tool on Kali Linux can help narrow down the kind of hash being dealt with in these situations).
Some values of -m
:
Hashcat password hash types
Type Hash 0 md5 100 sha1 900 md4 1000 Windows NTLM hashes 1400 sha256 1800 UNIX SHA-512 passwords ( $6$
)3000 LANMAN (Windows) 3200 bcrypt 13100 Kerberos 5 hashes (TGS-REP) 18200 Kerberos 5 hashes (AS-REP) There are also a large number of “Raw Hash, Salted and/or Iterated” modes that allow raw salted hashes (i.e., those not specific to a particular password type) to be processed; for these, specify the hashes as
Link to original$HASH:$SALT
.
Passwords are output as HASH:PLAINTEXT tuples.
Hashcat can accept the output of hashdump from Metasploit (use -m 1000
), as well as raw hashes from /etc/shadow (assuming that they’re all the same type).
A “token length exception” means that the provided hash format is of the wrong length (probably because an additional character got accidentally added).
Combinator
Hashcat combinator
The Hashcat combinator.bin utility combines two wordlists such that every entry of the first list is concatenated with every entry from the second list.
Link to original
Brute force password guessing
How to use Hashcat for brute force password guessing
Hashcat can also produce lists for brute forcing using the
-a 3
flag. If no hash is provided, then a simple list will be produced.The
Link to originalhashcat --help
command will display all available character sets (thed
in the above example).