Hashcat Examples | Browser |
Hashcat Examples | Browser |
Hashcat is the world’s fastest password recovery tool. It leverages the massive parallel processing power of GPUs to crack hashes at incredible speeds. Whether you are a penetration tester or a curious student, understanding how to use its various attack modes is essential.
Before running a command, you must know your hash type. Hashcat uses a specific code (-m) for each algorithm. MD5: -m 0 SHA-1: -m 100 SHA-256: -m 1400 NTLM: -m 1000 WPA/WPA2: -m 22000 hashcat examples
This is the most common method. Hashcat compares every word in a text file (wordlist) against the target hash. hashcat -a 0 -m 0 hash.txt rockyou.txt -a 0 : Attack mode 0 (Straight/Dictionary) -m 0 : Hash type (MD5) hash.txt : The file containing your target hash rockyou.txt : Your dictionary file 2. Brute-Force Attack (Mask Mode) Hashcat is the world’s fastest password recovery tool
If you don't have a wordlist, you can try every possible combination of characters. We use masks to define the character set and length. Before running a command, you must know your hash type
hashcat -a 6 -m 0 hash.txt rockyou.txt ?d?d?d
If list1 contains "Admin" and list2 contains "Secret," Hashcat will test "AdminSecret." 4. Hybrid Attack
💡 Hashcat is designed for graphics cards. Cracking on a CPU is significantly slower.💡 Check Status: Press s while Hashcat is running to see the current speed, temperature, and estimated time to completion.💡 The Potfile: Hashcat saves cracked passwords in hashcat.potfile . If you try to crack the same hash again, it will show as "Skipped." Use --show to see the recovered password.💡 Manage Heat: High-speed cracking generates heat. Monitor your GPU temperature to prevent hardware damage.