暴力密碼破解器 Hashcat
我本身不是學密碼相關的,如果有在開發的系統,請盡量避免在資料庫(Database)裡存密碼的明碼。
看了這幾篇相關文章,終於知道要怎麼在Hashcat裡使用多層 hash、加鹽(Salt);密碼有中文字的部份,似乎有binary 的mode 可以選擇;密碼超過55個字的這情情況下,使用者自己可能就記不起來。
相關文章:
暴力密碼破解器 ocl-Hashcat-plus 支援每秒猜測最多 80 億個密碼
git clone https://github.com/hashcat/hashcat.git
mkdir -p hashcat/deps
git clone https://github.com/KhronosGroup/OpenCL-Headers.git hashcat/deps/OpenCL
cd hashcat/
make
使用心得,大多情況下是會得到 exhausted [ɪgˋzɔstɪd] ,找不到結果,md5 8碼,要找2~5小時,滿可觀的,6碼以內的大多6秒內可以找到答案。善用字典加pattern真的很重要!
多層 hash, 在 hashcat 裡是設定 round,ex:
$5$rounds=5000
使用 hashcat 的 attach mode=3 (-a 3) 測 md5 為 1~6碼的,大約6秒內完成,使用 HMAC-SHA256 模式,只使用1個 round, 需要 2 mins, 22 secs來測試。
14.1.1. Key derivation¶
Key derivation and key stretching algorithms are designed for secure password hashing. Naive algorithms such as sha1(password)
are not resistant against brute-force attacks. A good password hashing function must be tunable, slow, and include a salt.
hashlib.
pbkdf2_hmac
(name, password, salt, rounds, dklen=None)- The function provides PKCS#5 password-based key derivation function 2. It uses HMAC as pseudorandom function.
The string name
os.urandom()
.The number of rounds should be chosen based on the hash algorithm and computing power. As of 2013, at least 100,000 rounds of SHA-256 is suggested.
dklen is the length of the derived key. If dklen is
None
then the digest size of the hash algorithm name is used, e.g. 64 for SHA-512.>>> import hashlib, binascii >>> dk = hashlib.pbkdf2_hmac('sha256', b'password', b'salt', 100000) >>> binascii.hexlify(dk) b'0394a2ede332c9a13eb82e9b24631604c31df978b4e2f0fbd2c549944f9d79a5'
New in version 2.7.8.
Mac OSX 上的 hashcat 使用說明:
hashcat, advanced password recovery Usage: hashcat [options]... hash|hashfile|hccapfile [dictionary|mask|directory]... - [ Options ] - Options Short / Long | Type | Description | Example ===============================+======+======================================================+======================= -m, --hash-type | Num | Hash-type, see references below | -m 1000 -a, --attack-mode | Num | Attack-mode, see references below | -a 3 -V, --version | | Print version | -h, --help | | Print help | --quiet | | Suppress output | --hex-charset | | Assume charset is given in hex | --hex-salt | | Assume salt is given in hex | --hex-wordlist | | Assume words in wordlist is given in hex | --force | | Ignore warnings | --status | | Enable automatic update of the status-screen | --status-timer | Num | Sets seconds between status-screen update to X | --status-timer=1 --machine-readable | | Display the status view in a machine readable format | --loopback | | Add new plains to induct directory | --weak-hash-threshold | Num | Threshold X when to stop checking for weak hashes | --weak=0 --markov-hcstat | File | Specify hcstat file to use | --markov-hc=my.hcstat --markov-disable | | Disables markov-chains, emulates classic brute-force | --markov-classic | | Enables classic markov-chains, no per-position | -t, --markov-threshold | Num | Threshold X when to stop accepting new markov-chains | -t 50 --runtime | Num | Abort session after X seconds of runtime | --runtime=10 --session | Str | Define specific session name | --session=mysession --restore | | Restore session from --session | --restore-disable | | Do not write restore file | -o, --outfile | File | Define outfile for recovered hash | -o outfile.txt --outfile-format | Num | Define outfile-format X for recovered hash | --outfile-format=7 --outfile-autohex-disable | | Disable the use of $HEX[] in output plains | --outfile-check-timer | Num | Sets seconds between outfile checks to X | --outfile-check=30 -p, --separator | Char | Separator char for hashlists and outfile | -p : --stdout | | Do not crack a hash, instead print candidates only | --show | | Compare hashlist with potfile; Show cracked hashes | --left | | Compare hashlist with potfile; Show uncracked hashes | --username | | Enable ignoring of usernames in hashfile | --remove | | Enable remove of hash once it is cracked | --remove-timer | Num | Update input hash file each X seconds | --remove-timer=30 --potfile-disable | | Do not write potfile | --potfile-path | Dir | Specific path to potfile | --potfile-path=my.pot --debug-mode | Num | Defines the debug mode (hybrid only by using rules) | --debug-mode=4 --debug-file | File | Output file for debugging rules | --debug-file=good.log --induction-dir | Dir | Specify the induction directory to use for loopback | --induction=inducts --outfile-check-dir | Dir | Specify the outfile directory to monitor for plains | --outfile-check-dir=x --logfile-disable | | Disable the logfile | --truecrypt-keyfiles | File | Keyfiles used, separate with comma | --truecrypt-key=x.png --veracrypt-keyfiles | File | Keyfiles used, separate with comma | --veracrypt-key=x.txt --veracrypt-pim | Num | VeraCrypt personal iterations multiplier | --veracrypt-pim=1000 -b, --benchmark | | Run benchmark | -c, --segment-size | Num | Sets size in MB to cache from the wordfile to X | -c 32 --bitmap-min | Num | Sets minimum bits allowed for bitmaps to X | --bitmap-min=24 --bitmap-max | Num | Sets maximum bits allowed for bitmaps to X | --bitmap-min=24 --cpu-affinity | Str | Locks to CPU devices, separate with comma | --cpu-affinity=1,2,3 --opencl-platforms | Str | OpenCL platforms to use, separate with comma | --opencl-platforms=2 -d, --opencl-devices | Str | OpenCL devices to use, separate with comma | -d 1 -D, --opencl-device-types | Str | OpenCL device-types to use, separate with comma | -D 1 --opencl-vector-width | Num | Manual override OpenCL vector-width to X | --opencl-vector=4 -w, --workload-profile | Num | Enable a specific workload profile, see pool below | -w 3 -n, --kernel-accel | Num | Manual workload tuning, set outerloop step size to X | -n 64 -u, --kernel-loops | Num | Manual workload tuning, set innerloop step size to X | -u 256 --nvidia-spin-damp | Num | Workaround NVidias CPU burning loop bug, in percent | --nvidia-spin-damp=50 --gpu-temp-disable | | Disable temperature and fanspeed reads and triggers | --scrypt-tmto | Num | Manually override TMTO value for scrypt to X | --scrypt-tmto=3 -s, --skip | Num | Skip X words from the start | -s 1000000 -l, --limit | Num | Limit X words from the start + skipped words | -l 1000000 --keyspace | | Show keyspace base:mod values and quit | -j, --rule-left | Rule | Single rule applied to each word from left wordlist | -j 'c' -k, --rule-right | Rule | Single rule applied to each word from right wordlist | -k '^-' -r, --rules-file | File | Multiple rules applied to each word from wordlists | -r rules/best64.rule -g, --generate-rules | Num | Generate X random rules | -g 10000 --generate-rules-func-min | Num | Force min X funcs per rule | --generate-rules-func-max | Num | Force max X funcs per rule | --generate-rules-seed | Num | Force RNG seed set to X | -1, --custom-charset1 | CS | User-defined charset ?1 | -1 ?l?d?u -2, --custom-charset2 | CS | User-defined charset ?2 | -2 ?l?d?s -3, --custom-charset3 | CS | User-defined charset ?3 | -4, --custom-charset4 | CS | User-defined charset ?4 | -i, --increment | | Enable mask increment mode | --increment-min | Num | Start mask incrementing at X | --increment-min=4 --increment-max | Num | Stop mask incrementing at X | --increment-max=8 - [ Hash modes ] - # | Name | Category ======+==================================================+====================================== 900 | MD4 | Raw Hash 0 | MD5 | Raw Hash 5100 | Half MD5 | Raw Hash 100 | SHA1 | Raw Hash 10800 | SHA-384 | Raw Hash 1400 | SHA-256 | Raw Hash 1700 | SHA-512 | Raw Hash 5000 | SHA-3(Keccak) | Raw Hash 10100 | SipHash | Raw Hash 6000 | RipeMD160 | Raw Hash 6100 | Whirlpool | Raw Hash 6900 | GOST R 34.11-94 | Raw Hash 11700 | GOST R 34.11-2012 (Streebog) 256-bit | Raw Hash 11800 | GOST R 34.11-2012 (Streebog) 512-bit | Raw Hash 10 | md5($pass.$salt) | Raw Hash, Salted and / or Iterated 20 | md5($salt.$pass) | Raw Hash, Salted and / or Iterated 30 | md5(unicode($pass).$salt) | Raw Hash, Salted and / or Iterated 40 | md5($salt.unicode($pass)) | Raw Hash, Salted and / or Iterated 3800 | md5($salt.$pass.$salt) | Raw Hash, Salted and / or Iterated 3710 | md5($salt.md5($pass)) | Raw Hash, Salted and / or Iterated 2600 | md5(md5($pass)) | Raw Hash, Salted and / or Iterated 4300 | md5(strtoupper(md5($pass))) | Raw Hash, Salted and / or Iterated 4400 | md5(sha1($pass)) | Raw Hash, Salted and / or Iterated 110 | sha1($pass.$salt) | Raw Hash, Salted and / or Iterated 120 | sha1($salt.$pass) | Raw Hash, Salted and / or Iterated 130 | sha1(unicode($pass).$salt) | Raw Hash, Salted and / or Iterated 140 | sha1($salt.unicode($pass)) | Raw Hash, Salted and / or Iterated 4500 | sha1(sha1($pass)) | Raw Hash, Salted and / or Iterated 4700 | sha1(md5($pass)) | Raw Hash, Salted and / or Iterated 4900 | sha1($salt.$pass.$salt) | Raw Hash, Salted and / or Iterated 1410 | sha256($pass.$salt) | Raw Hash, Salted and / or Iterated 1420 | sha256($salt.$pass) | Raw Hash, Salted and / or Iterated 1430 | sha256(unicode($pass).$salt) | Raw Hash, Salted and / or Iterated 1440 | sha256($salt.unicode($pass)) | Raw Hash, Salted and / or Iterated 1710 | sha512($pass.$salt) | Raw Hash, Salted and / or Iterated 1720 | sha512($salt.$pass) | Raw Hash, Salted and / or Iterated 1730 | sha512(unicode($pass).$salt) | Raw Hash, Salted and / or Iterated 1740 | sha512($salt.unicode($pass)) | Raw Hash, Salted and / or Iterated 50 | HMAC-MD5 (key = $pass) | Raw Hash, Authenticated 60 | HMAC-MD5 (key = $salt) | Raw Hash, Authenticated 150 | HMAC-SHA1 (key = $pass) | Raw Hash, Authenticated 160 | HMAC-SHA1 (key = $salt) | Raw Hash, Authenticated 1450 | HMAC-SHA256 (key = $pass) | Raw Hash, Authenticated 1460 | HMAC-SHA256 (key = $salt) | Raw Hash, Authenticated 1750 | HMAC-SHA512 (key = $pass) | Raw Hash, Authenticated 1760 | HMAC-SHA512 (key = $salt) | Raw Hash, Authenticated 14000 | DES (PT = $salt, key = $pass) | Raw Cipher, Known-Plaintext attack 14100 | 3DES (PT = $salt, key = $pass) | Raw Cipher, Known-Plaintext attack 400 | phpass | Generic KDF 8900 | scrypt | Generic KDF 11900 | PBKDF2-HMAC-MD5 | Generic KDF 12000 | PBKDF2-HMAC-SHA1 | Generic KDF 10900 | PBKDF2-HMAC-SHA256 | Generic KDF 12100 | PBKDF2-HMAC-SHA512 | Generic KDF 23 | Skype | Network protocols 2500 | WPA/WPA2 | Network protocols 4800 | iSCSI CHAP authentication, MD5(Chap) | Network protocols 5300 | IKE-PSK MD5 | Network protocols 5400 | IKE-PSK SHA1 | Network protocols 5500 | NetNTLMv1 | Network protocols 5500 | NetNTLMv1 + ESS | Network protocols 5600 | NetNTLMv2 | Network protocols 7300 | IPMI2 RAKP HMAC-SHA1 | Network protocols 7500 | Kerberos 5 AS-REQ Pre-Auth etype 23 | Network protocols 8300 | DNSSEC (NSEC3) | Network protocols 10200 | Cram MD5 | Network protocols 11100 | PostgreSQL CRAM (MD5) | Network protocols 11200 | MySQL CRAM (SHA1) | Network protocols 11400 | SIP digest authentication (MD5) | Network protocols 13100 | Kerberos 5 TGS-REP etype 23 | Network protocols 121 | SMF (Simple Machines Forum) | Forums, CMS, E-Commerce, Frameworks 400 | phpBB3 | Forums, CMS, E-Commerce, Frameworks 2611 | vBulletin < v3.8.5 | Forums, CMS, E-Commerce, Frameworks 2711 | vBulletin > v3.8.5 | Forums, CMS, E-Commerce, Frameworks 2811 | MyBB | Forums, CMS, E-Commerce, Frameworks 2811 | IPB (Invison Power Board) | Forums, CMS, E-Commerce, Frameworks 8400 | WBB3 (Woltlab Burning Board) | Forums, CMS, E-Commerce, Frameworks 11 | Joomla < 2.5.18 | Forums, CMS, E-Commerce, Frameworks 400 | Joomla > 2.5.18 | Forums, CMS, E-Commerce, Frameworks 400 | WordPress | Forums, CMS, E-Commerce, Frameworks 2612 | PHPS | Forums, CMS, E-Commerce, Frameworks 7900 | Drupal7 | Forums, CMS, E-Commerce, Frameworks 21 | osCommerce | Forums, CMS, E-Commerce, Frameworks 21 | xt:Commerce | Forums, CMS, E-Commerce, Frameworks 11000 | PrestaShop | Forums, CMS, E-Commerce, Frameworks 124 | Django (SHA-1) | Forums, CMS, E-Commerce, Frameworks 10000 | Django (PBKDF2-SHA256) | Forums, CMS, E-Commerce, Frameworks 3711 | Mediawiki B type | Forums, CMS, E-Commerce, Frameworks 7600 | Redmine | Forums, CMS, E-Commerce, Frameworks 13900 | OpenCart | Forums, CMS, E-Commerce, Frameworks 12 | PostgreSQL | Database Server 131 | MSSQL(2000) | Database Server 132 | MSSQL(2005) | Database Server 1731 | MSSQL(2012) | Database Server 1731 | MSSQL(2014) | Database Server 200 | MySQL323 | Database Server 300 | MySQL4.1/MySQL5 | Database Server 3100 | Oracle H: Type (Oracle 7+) | Database Server 112 | Oracle S: Type (Oracle 11+) | Database Server 12300 | Oracle T: Type (Oracle 12+) | Database Server 8000 | Sybase ASE | Database Server 141 | EPiServer 6.x < v4 | HTTP, SMTP, LDAP Server 1441 | EPiServer 6.x > v4 | HTTP, SMTP, LDAP Server 1600 | Apache $apr1$ | HTTP, SMTP, LDAP Server 12600 | ColdFusion 10+ | HTTP, SMTP, LDAP Server 1421 | hMailServer | HTTP, SMTP, LDAP Server 101 | nsldap, SHA-1(Base64), Netscape LDAP SHA | HTTP, SMTP, LDAP Server 111 | nsldaps, SSHA-1(Base64), Netscape LDAP SSHA | HTTP, SMTP, LDAP Server 1711 | SSHA-512(Base64), LDAP {SSHA512} | HTTP, SMTP, LDAP Server 11500 | CRC32 | Checksums 3000 | LM | Operating-Systems 1000 | NTLM | Operating-Systems 1100 | Domain Cached Credentials (DCC), MS Cache | Operating-Systems 2100 | Domain Cached Credentials 2 (DCC2), MS Cache 2 | Operating-Systems 12800 | MS-AzureSync PBKDF2-HMAC-SHA256 | Operating-Systems 1500 | descrypt, DES(Unix), Traditional DES | Operating-Systems 12400 | BSDiCrypt, Extended DES | Operating-Systems 500 | md5crypt $1$, MD5(Unix) | Operating-Systems 3200 | bcrypt $2*$, Blowfish(Unix) | Operating-Systems 7400 | sha256crypt $5$, SHA256(Unix) | Operating-Systems 1800 | sha512crypt $6$, SHA512(Unix) | Operating-Systems 122 | OSX v10.4, OSX v10.5, OSX v10.6 | Operating-Systems 1722 | OSX v10.7 | Operating-Systems 7100 | OSX v10.8, OSX v10.9, OSX v10.10 | Operating-Systems 6300 | AIX {smd5} | Operating-Systems 6700 | AIX {ssha1} | Operating-Systems 6400 | AIX {ssha256} | Operating-Systems 6500 | AIX {ssha512} | Operating-Systems 2400 | Cisco-PIX | Operating-Systems 2410 | Cisco-ASA | Operating-Systems 500 | Cisco-IOS $1$ | Operating-Systems 5700 | Cisco-IOS $4$ | Operating-Systems 9200 | Cisco-IOS $8$ | Operating-Systems 9300 | Cisco-IOS $9$ | Operating-Systems 22 | Juniper Netscreen/SSG (ScreenOS) | Operating-Systems 501 | Juniper IVE | Operating-Systems 5800 | Android PIN | Operating-Systems 13800 | Windows 8+ phone PIN/Password | Operating-Systems 8100 | Citrix Netscaler | Operating-Systems 8500 | RACF | Operating-Systems 7200 | GRUB 2 | Operating-Systems 9900 | Radmin2 | Operating-Systems 125 | ArubaOS | Operating-Systems 7700 | SAP CODVN B (BCODE) | Enterprise Application Software (EAS) 7800 | SAP CODVN F/G (PASSCODE) | Enterprise Application Software (EAS) 10300 | SAP CODVN H (PWDSALTEDHASH) iSSHA-1 | Enterprise Application Software (EAS) 8600 | Lotus Notes/Domino 5 | Enterprise Application Software (EAS) 8700 | Lotus Notes/Domino 6 | Enterprise Application Software (EAS) 9100 | Lotus Notes/Domino 8 | Enterprise Application Software (EAS) 133 | PeopleSoft | Enterprise Application Software (EAS) 13500 | PeopleSoft Token | Enterprise Application Software (EAS) 11600 | 7-Zip | Archives 12500 | RAR3-hp | Archives 13000 | RAR5 | Archives 13200 | AxCrypt | Archives 13300 | AxCrypt in memory SHA1 | Archives 13600 | WinZip | Archives 62XY | TrueCrypt | Full-Disk encryptions (FDE) X | 1 = PBKDF2-HMAC-RipeMD160 | Full-Disk encryptions (FDE) X | 2 = PBKDF2-HMAC-SHA512 | Full-Disk encryptions (FDE) X | 3 = PBKDF2-HMAC-Whirlpool | Full-Disk encryptions (FDE) X | 4 = PBKDF2-HMAC-RipeMD160 + boot-mode | Full-Disk encryptions (FDE) Y | 1 = XTS 512 bit pure AES | Full-Disk encryptions (FDE) Y | 1 = XTS 512 bit pure Serpent | Full-Disk encryptions (FDE) Y | 1 = XTS 512 bit pure Twofish | Full-Disk encryptions (FDE) Y | 2 = XTS 1024 bit pure AES | Full-Disk encryptions (FDE) Y | 2 = XTS 1024 bit pure Serpent | Full-Disk encryptions (FDE) Y | 2 = XTS 1024 bit pure Twofish | Full-Disk encryptions (FDE) Y | 2 = XTS 1024 bit cascaded AES-Twofish | Full-Disk encryptions (FDE) Y | 2 = XTS 1024 bit cascaded Serpent-AES | Full-Disk encryptions (FDE) Y | 2 = XTS 1024 bit cascaded Twofish-Serpent | Full-Disk encryptions (FDE) Y | 3 = XTS 1536 bit all | Full-Disk encryptions (FDE) 8800 | Android FDE < v4.3 | Full-Disk encryptions (FDE) 12900 | Android FDE (Samsung DEK) | Full-Disk encryptions (FDE) 12200 | eCryptfs | Full-Disk encryptions (FDE) 137XY | VeraCrypt | Full-Disk encryptions (FDE) X | 1 = PBKDF2-HMAC-RipeMD160 | Full-Disk encryptions (FDE) X | 2 = PBKDF2-HMAC-SHA512 | Full-Disk encryptions (FDE) X | 3 = PBKDF2-HMAC-Whirlpool | Full-Disk encryptions (FDE) X | 4 = PBKDF2-HMAC-RipeMD160 + boot-mode | Full-Disk encryptions (FDE) X | 5 = PBKDF2-HMAC-SHA256 | Full-Disk encryptions (FDE) X | 6 = PBKDF2-HMAC-SHA256 + boot-mode | Full-Disk encryptions (FDE) Y | 1 = XTS 512 bit pure AES | Full-Disk encryptions (FDE) Y | 1 = XTS 512 bit pure Serpent | Full-Disk encryptions (FDE) Y | 1 = XTS 512 bit pure Twofish | Full-Disk encryptions (FDE) Y | 2 = XTS 1024 bit pure AES | Full-Disk encryptions (FDE) Y | 2 = XTS 1024 bit pure Serpent | Full-Disk encryptions (FDE) Y | 2 = XTS 1024 bit pure Twofish | Full-Disk encryptions (FDE) Y | 2 = XTS 1024 bit cascaded AES-Twofish | Full-Disk encryptions (FDE) Y | 2 = XTS 1024 bit cascaded Serpent-AES | Full-Disk encryptions (FDE) Y | 2 = XTS 1024 bit cascaded Twofish-Serpent | Full-Disk encryptions (FDE) Y | 3 = XTS 1536 bit all | Full-Disk encryptions (FDE) 9700 | MS Office <= 2003 $0|$1, MD5 + RC4 | Documents 9710 | MS Office <= 2003 $0|$1, MD5 + RC4, collider #1 | Documents 9720 | MS Office <= 2003 $0|$1, MD5 + RC4, collider #2 | Documents 9800 | MS Office <= 2003 $3|$4, SHA1 + RC4 | Documents 9810 | MS Office <= 2003 $3|$4, SHA1 + RC4, collider #1 | Documents 9820 | MS Office <= 2003 $3|$4, SHA1 + RC4, collider #2 | Documents 9400 | MS Office 2007 | Documents 9500 | MS Office 2010 | Documents 9600 | MS Office 2013 | Documents 10400 | PDF 1.1 - 1.3 (Acrobat 2 - 4) | Documents 10410 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #1 | Documents 10420 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #2 | Documents 10500 | PDF 1.4 - 1.6 (Acrobat 5 - 8) | Documents 10600 | PDF 1.7 Level 3 (Acrobat 9) | Documents 10700 | PDF 1.7 Level 8 (Acrobat 10 - 11) | Documents 9000 | Password Safe v2 | Password Managers 5200 | Password Safe v3 | Password Managers 6800 | Lastpass + Lastpass sniffed | Password Managers 6600 | 1Password, agilekeychain | Password Managers 8200 | 1Password, cloudkeychain | Password Managers 11300 | Bitcoin/Litecoin wallet.dat | Password Managers 12700 | Blockchain, My Wallet | Password Managers 13400 | Keepass 1 (AES/Twofish) and Keepass 2 (AES) | Password Managers - [ Outfile Formats ] - # | Format ===+======== 1 | hash[:salt] 2 | plain 3 | hash[:salt]:plain 4 | hex_plain 5 | hash[:salt]:hex_plain 6 | plain:hex_plain 7 | hash[:salt]:plain:hex_plain 8 | crackpos 9 | hash[:salt]:crack_pos 10 | plain:crack_pos 11 | hash[:salt]:plain:crack_pos 12 | hex_plain:crack_pos 13 | hash[:salt]:hex_plain:crack_pos 14 | plain:hex_plain:crack_pos 15 | hash[:salt]:plain:hex_plain:crack_pos - [ Rule Debugging Modes ] - # | Format ===+======== 1 | Finding-Rule 2 | Original-Word 3 | Original-Word:Finding-Rule 4 | Original-Word:Finding-Rule:Processed-Word - [ Attack Modes ] - # | Mode ===+====== 0 | Straight 1 | Combination 3 | Brute-force 6 | Hybrid Wordlist + Mask 7 | Hybrid Mask + Wordlist - [ Built-in Charsets ] - ? | Charset ===+========= l | abcdefghijklmnopqrstuvwxyz u | ABCDEFGHIJKLMNOPQRSTUVWXYZ d | 0123456789 s | !"#$%&'()*+,-./:;<=>[email protected][\]^_`{|}~ a | ?l?u?d?s b | 0x00 - 0xff - [ OpenCL Device Types ] - # | Device Type ===+============= 1 | CPU 2 | GPU 3 | FPGA, DSP, Co-Processor - [ Workload Profiles ] - # | Performance | Runtime | Power Consumption | Desktop Impact ===+=============+=========+===================+================= 1 | Low | 2 ms | Low | Minimal 2 | Default | 12 ms | Economic | Noticeable 3 | High | 96 ms | High | Unresponsive 4 | Nightmare | 480 ms | Insane | Headless - [ Basic Examples ] - Attack- | Hash- | Mode | Type | Example command ==================+=======+================================================================== Wordlist | $P$ | hashcat -a 0 -m 400 example400.hash example.dict Wordlist + Rules | MD5 | hashcat -a 0 -m 0 example0.hash example.dict -r rules/best64.rule Brute-Force | MD5 | hashcat -a 3 -m 0 example0.hash ?a?a?a?a?a?a Combinator | MD5 | hashcat -a 1 -m 0 example0.hash example.dict example.dict
If you still have no idea what just happened try following pages: