System Grab Bag

View all TLDR pages from common (or from all pages)

hashcat

Fast and advanced password recovery tool. More information: https://hashcat.net/wiki/doku.php?id=hashcat.
  • Perform a brute-force attack (mode 3) with the default hashcat mask:
    hashcat --hash-type {{hash_type_id}} --attack-mode {{3}} {{hash_value}}
  • Perform a brute-force attack (mode 3) with a known pattern of 4 digits:
    hashcat --hash-type {{hash_type_id}} --attack-mode {{3}} {{hash_value}} "{{?d?d?d?d}}"
  • Perform a brute-force attack (mode 3) using at most 8 of all printable ASCII characters:
    hashcat --hash-type {{hash_type_id}} --attack-mode {{3}} --increment {{hash_value}} "{{?a?a?a?a?a?a?a?a}}"
  • Perform a dictionary attack (mode 0) using the RockYou wordlist of a Kali Linux box:
    hashcat --hash-type {{hash_type_id}} --attack-mode {{0}} {{hash_value}} {{/usr/share/wordlists/rockyou.txt}}
  • Perform a rule-based dictionary attack (mode 0) using the RockYou wordlist mutated with common password variations:
    hashcat --hash-type {{hash_type_id}} --attack-mode {{0}} --rules-file {{/usr/share/hashcat/rules/best64.rule}} {{hash_value}} {{/usr/share/wordlists/rockyou.txt}}
  • Perform a combination attack (mode 1) using the concatenation of words from two different custom dictionaries:
    hashcat --hash-type {{hash_type_id}} --attack-mode {{1}} {{hash_value}} {{/path/to/dictionary1.txt}} {{/path/to/dictionary2.txt}}
  • Show result of an already cracked hash:
    hashcat --show {{hash_value}}

License and Disclaimer

The content on this page is copyright © 2014—present the tldr-pages team and contributors.
This page is used with permission under Creative Commons Attribution 4.0 International License.

While we do attempt to make sure content is accurate, there isn't a warranty of any kind.