HASHCAT

INSTALLATION

root@oco:~$ sudo apt search hashcat
 hashcat/parrot6,now 6.2.6+ds1-1+b1 amd64 [installed]
  World's fastest and most advanced password recovery utility
  
root@oco:~$ sudo apt install hashcat
 ...

CRACKING: MD5 HASHES

root@oco:~$ hash-identifier
 HASH: cc03e747a6afbbcbf8be7668acfebee5             
 Possible Hashs:
 [+] MD5
 [+] Domain Cached Credentials - MD4(MD4(($pass)).(strtolower($username)))

root@oco:~$ echo -n '{passwordHash}' > passwordHash
root@oco:~$ hashcat --help | grep -i md5
 0 | MD5                                                        | Raw Hash
 
root@oco:~$ hashcat -a 0 -m 0 passwordHash /usr/share/wordlists/rockyou.txt
 Dictionary cache hit:
 * Filename..: rockyou.txt
 * Passwords.: 14344384
 * Bytes.....: 139921497
 * Keyspace..: 14344384

 cc03e747a6afbbcbf8be7668acfebee5:test123                  
                                                          
 Session..........: hashcat
 Status...........: Cracked
 Hash.Mode........: 0 (MD5)
 Hash.Target......: cc03e747a6afbbcbf8be7668acfebee5
 Time.Started.....: Sun Oct 26 20:55:20 2025 (0 secs)
 Time.Estimated...: Sun Oct 26 20:55:20 2025 (0 secs)
 Kernel.Feature...: Pure Kernel
 Guess.Base.......: File (rockyou.txt)
 Guess.Queue......: 1/1 (100.00%)
 Speed.#1.........:  1914.9 kH/s (0.45ms) @ Accel:1024 Loops:1 Thr:1 Vec:8
 Recovered........: 1/1 (100.00%) Digests (total), 1/1 (100.00%) Digests (new)
 Progress.........: 20480/14344384 (0.14%)
 Rejected.........: 0/20480 (0.00%)
 Restore.Point....: 16384/14344384 (0.11%)
 Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
 Candidate.Engine.: Device Generator
 Candidates.#1....: chatty -> michael!
 Hardware.Mon.#1..: Util: 27%

 Started: Sun Oct 26 20:55:19 2025
 Stopped: Sun Oct 26 20:55:22 2025

 * the "-a 0" specifies the attack mode. 0 means straight mode, which is the simplest 
   and most common mode where hashcat attempts to crack the hash by directly using 
   wordlist entries.

 * the "-m 0" specifies the hash type. 0 means MD5 hashes. So, hashcat will treat the 
   hashes in the hash file as MD5.

CRACKING: BLOWFISH (AKA BCRYPT) HASHES

CRACKING: SHA1 HASHES

CRACKING: SHA512 HASHES

CRACKING: MYSQL 160BIT

  • Use John the Ripper when cracking this type of hash or any hashes that starts with *

CRACKING: WORDLIST & LEET SPEAK MANGLING (BUILT-IN RULE)

CRACKING: WORDLIST & LEET SPEAK MANGLING (CUSTOM RULE)

CRACKING: IPMI HASHES

CRACKING: KERBEROS HASHES

Last updated