国产夫妻在线播放_精品久久国产97色综合_麻豆精品视频在线观看视频_青草青草久热精品视频在线网站_av资源在线_亚洲国产精品久久不卡毛片_成人黄色大片网站_黄色欧美日韩_欧美性一区二区三区_美女视频免费观看网站在线_亚洲精品无吗_狠狠躁夜夜躁久久躁别揉

Hashcat tutorial on cracking mode parameter settings

2024-12-24 20:05:32

1. Combination mode (-a 1)

Sometimes, we will encounter such a problem, for example, the password is abcdabcd mode, and we do not have abcdabcd in the dictionary, if we go to generate, it will take up a huge space, can there be a way to generate abcdabcd through abcd? In hashcat, of course, it is possible, and in this section we will first talk about this pattern, which is the dictionary combination attack pattern (parameter denoted as -a 1).

1. The combination mode of the same dictionary

First, let's describe the meaning of -a 1 with a simple example, and then take you step by step to the complex application of the pattern.

hashcat –a 1 –m 0 mima.txt –o outfile dic.txt dic.txt

0.png
The meaning of this command is to use the dictionary of dic.txt and combine it to decipher the mima.txt, if the dic.txt is a dictionary as shown in the figure below

1.png
Then the new dictionary for deciphering the mima.txt formed by the combination of the commands is:

2.png
That is, each line in the dic.txt is combined with itself to form a new dictionary.

2. The combination mode of different dictionaries

The previous description is the combination of the same dictionary, if it is a different dictionary, hashcat is also supported, using the following command

3.png
It means that all the rows in the dic1.txt are combined with all the rows in the dic2.txt to form a dictionary that solves the mima.txt.

When is the combination mode used? In general, the combination mode is clearly divided into two segments, such as: abcd1234, asdfasdf, aaa19770101、...... In other cases, the password is clearly manifested in the previous paragraph and the next paragraph.

3. What needs to be paid attention to

(1) In combination mode, hashcat can only support the combination of two dictionaries (or the same dictionary twice), and cannot support multiple dictionaries (more than 3 dictionaries) or the same dictionary more than 3 times of combination attacks.

That is, the following command is wrong:

hashcat  –a 1 –m 0 mima.txt –ooutfile dic.txt dic.txt

hashcat  –a 1 –m 0 mima.txt –ooutfile dic1.txt dic2.txt dic3.txt

(2) In combination mode, the directory is not supported (in the previous article, the entire directory is supported in the -a 0 mode), which means that the following two situations are also not possible.

hashcat  –a 1 –m 0 mima.txt –ooutfile /dic/

hashcat  –a 1 –m 0 mima.txt –ooutfile /dic/*.txt

(3) Timeliness

When using the combination mode, if the dictionary is large, for example, two dictionaries are 10,000,000, the combined space is 100,000,000,000,000,000, which is equivalent to the attack of 10,000,000 dictionaries (each dictionary has 10,000,000 entries), then the space is too large, and there may be a lot of repetition, although the coverage increases, but the timeliness is not high.

2. Brute-force attack mode (-a 3)

Brute-force hacking, as the name suggests, is to violently exhaust the specified plaintext space, which is a way to do it (because you can't narrow the exhaustion space).

Before we get into brute force, let's talk about exhausting space. Take the common lowercase letters + numbers as an example, if the password length is 4, its space is 36**4=1679616, which seems to be not big, and it will come out in a while; If the length of the password is 8, then its space is 36**8=2821109907456, and if the solution time is 1000,000,000 (1 billion times/s), the solution time is about 2820 seconds, about 47 minutes, which seems to be bearable; If the length of the password is 10, its space is 36**10=3656158440062976, and if the solution time is 1000,000,000 (1 billion times/s), the solution time exceeds 1000 hours, then there is no way to accept it.

There are many different types of brute-force attack modes (parameter denoted as -a 3) in hashcat, and we will talk about them one by one below.

1. Simple mode

There are 8 default character sets built into Hashcat, which are l (26 lowercase letters), u (26 uppercase letters), d (10 numbers), h (lowercase hexadecimal characters), H (uppercase hexadecimal characters), s (special characters 31), a (l, u, d, s collection of 95 full characters) and b (binary 0x00-0xFF). This is shown in the figure below

4.pngExample

(1) If the lowercase 6-bit space is exhausted, use the following command:

5.png(2) If the 8-bit space of all characters is exhausted, use the following command:

6.png(3) If the all-digital space with a range of 4-6 bits is exhausted, the command is as follows:

7.pngHere, a parameter --inrcement --increment-min 4 --inrcement --increment-max 6 is added to indicate the minimum and maximum values of the exhaustion length.

2. Combination mode

The combinatorial pattern here is an organizational pattern in exhaustive mode, not a (-a 1) pattern.

Let's take a quick example:

(1) If a password is exhausted and the length of the password is estimated to be 6, the first digit is the full character set, the second digit is lowercase letters, the third digit is uppercase letters, and the fourth, fifth, and sixth digits are the full character set, then the command can use the following mode:

8.png(2) The following are several combination modes,

1: If a password has a range of case + digits and a length of 6, the command is as follows:

9.pngHere -1 ?l?u?d is used to represent uppercase and lowercase letters + numbers.

2: If the exhaustion range is 6 digits, the first and fourth digits are uppercase + numbers, the second digits are uppercase and lowercase, the third and fifth digits are uppercase + digits, and the sixth digit is a number, then the command is as follows:

10.pngOf course, you can also specify the minimum and maximum lengths, as shown in the following image

11.png
3. Custom mode

Earlier, we introduced that hashcat has 8 built-in character sets, but what if the character set you need is not within these 8 types? What to do? It doesn't matter, Hashcat also has a wealth of custom brute force attack modes for everyone.

Using the hashcat –h command, you can see that the following usage patterns are defined

12.pngBelow, let's explain through one example after another:

(1) If the password length is 8 digits and each bit consists of 0123456789aqwcfhj,.<>=-_+, you can use the following commands:

13.pngYou can also write these characters as a file, such as char.txt, using the following command.

14.png(2) If the password length is 8 digits, the first, third, and sixth digits are in "43545yt", the second and fourth digits are in "345dfv-=_+", the fifth and seventh digits are in "9vjnbbf-brg", and the eighth digit is in "345fkfggh", you can use the following commands:

15.pngOf course, you can also write these characters into different files, for example char1.txt、........., use the following command.

16.pngNote: Some symbols have special meanings on the command line, so when there are special symbols in the character set, it is best to write these symbols as files.

(3) On the basis of (2), increase the minimum length and maximum length, such as 4-8 bits. You can use the following commands.

17.png

Third, the use of some parameters

In the previous article, we introduced the use of some parameters, and today, we will move on to some of the commonly used parameters. Today we will focus on the screen display parameters

In the previous article, we introduced the file output command (-o/--outfile-format), which can be used to output the hashcat password decipher to a file in a certain format. But while hashcat is running, we can't see which passwords hashcat has deciphered. If we can directly print the password deciphered by hashcat to the screen in HashCat work, it will be more intuitive and convenient. There are exactly a few parameters in hashcat that can output the hashcat running result to the screen.

1、 --show

The show command will output the deciphered hash and password cached in the pot file to the screen window.

18.png

2、--left

The left command will output the hash value of the hashcat undeciphered to the screen

19.png

3、--stdout

The stdout command does not code-break, but it prints the contents of the dictionary used for code-breaking.

20.png

Fourth, summary

If you want to give full play to the function and role of hashcat, it is recommended that you try more with different commands, so as to be familiar with the combination of different hashcat commands. For the hashcat parameter, you can refer to the hashcat online help (-h).

Previous:Hashcat is a password explosion artifact
Next:Experience sharing of hashcat using GPU acceleration to improve d
国产精品一区二区无线| 国产免费视频| 精品视频资源站| 国产精品久久天天影视| 91短视频在线| 国产日韩综合一区二区性色av| 国产精品丝袜91| av成人男女| av二区三区| 国产精品直播网红| 精品久久久一区二区| 一区二区在线| 91电影在线播放| 久久99影院| 91精品麻豆日日躁夜夜躁| 亚洲私拍自拍| fc2ppv国产精品久久| 亚洲精品成人久久久998| 亚洲精品国产精品自产a区红杏吧| 每日更新成人在线视频| av在线网页| 美女扒开大腿让男人桶| 欧美成人四级hd版| 日韩理论片网站| 国产精品99久久| 国产爆初菊在线观看免费视频网站 | 成人精品视频在线播放| 日韩中文字幕亚洲| 国产精品卡一卡二卡三| 国产亚洲欧美日韩在线观看一区二区 | 999精品网站| 国产成人亚洲综合| 欧美人伦禁忌dvd放荡欲情| 久久国产人妖系列| 亚洲视频精选| 日韩a在线看| 亚洲在线观看一区| 色综合老司机第九色激情 | 亚洲色图17p| 亚洲国产精华液网站w| 成人系列视频| 宅男在线观看免费高清网站| 蜜桃视频一区二区在线观看| 97婷婷涩涩精品一区| 欧洲一区二区三区在线| 国产综合色产在线精品| 久久久久97| 成年人网站在线| 日韩精品一区中文字幕| 亚洲综合一区二区不卡| 国产亚洲福利一区| 五月天欧美精品| 国产一区二区三区av电影 | 国产精品成人在线| 欧美人xxxx| 91老司机福利 在线| 欧美3p在线观看| 中国字幕a在线看韩国电影| 男女午夜网站| 亚洲电影免费| 国产999视频| 亚洲福利小视频| 亚洲综合在线第一页| 久久97超碰国产精品超碰| 精品中文一区| 综合另类专区| 日本免费不卡| 男人的天堂99| 欧美精品二区三区四区免费看视频| 欧美黑人一区二区三区| 日韩精品一区二区三区四区 | 亚洲色无码播放| 亚洲国产成人91porn| 国产精品99久久久久| 99精品一区| 青青青国产精品| jizz在线免费观看| 中文字幕网av| 亚洲春色在线视频| 国产日韩综合一区二区性色av| 亚洲精品永久免费| 色综合咪咪久久| 久久精子c满五个校花| 久久中文字幕一区二区三区| 一本久久青青| 国产精品久久久久久久久免费高清| 蜜桃在线一区二区三区| 中文精品在线| 日韩精品国产欧美| 中文字幕在线观看一区| 欧美日韩国产丝袜美女| 99精品欧美一区| 麻豆精品新av中文字幕| 青青草在线视频免费观看| 久久精品国产一区二区三 | 欧美狂野另类xxxxoooo| 国产日产精品一区| 久久久久国产精品一区二区| 日韩亚洲视频| 欧美视频在线观看 亚洲欧| 久久久久一区二区三区四区| 免播放器亚洲一区| 亚洲理伦在线| 希岛爱理一区二区三区| 丝袜av一区| 精品午夜av| 韩国成人在线| 国产自产自拍视频在线观看| av在线之家电影网站| 天堂资源av| 日本wwwwww| 国产又猛又黄的视频| 真人抽搐一进一出视频| 夜夜爽www精品| 欧美裸体网站| 精品国产一区二区三区日日嗨| 成人福利免费观看| 国产精品高清在线观看| 久久久久久成人精品| 久久久成人精品| 色综合影院在线| 一本色道久久88亚洲综合88| 亚洲级视频在线观看免费1级| 日韩欧美激情在线| 91精品在线麻豆| 7777精品伊人久久久大香线蕉的 | 国精产品一区一区三区mba视频| 亚洲视频综合| 欧美日韩ab| 欧美 亚欧 日韩视频在线 | 日本三级中国三级99人妇网站| 91福利入口| 91免费福利视频| 成人啪啪免费看| 国产成人精品一区| 97碰在线观看| 奇门遁甲1982国语版免费观看高清| 97色在线视频| 日本精品视频在线播放| 青草热久免费精品视频| 国产xxx69麻豆国语对白| 国产精品电影久久久久电影网| 国产精品都在这里| 91精品视频一区| 国产一区二区三区高清| 久中文字幕一区| 亚洲开发第一视频在线播放| 一区精品在线| 青青草国产免费| av免费在线播放网站| 99热在线观看免费| 久草.com| 日av在线播放| 日本欧美在线视频免费观看| 性爱视频在线播放| 亚洲精华液一区二区三区| 欧美xxxx做受欧美护士| 亚洲黑人在线| 成人直播在线观看| 亚洲另类春色校园小说| 久久日文中文字幕乱码| 亚洲私拍自拍| 麻豆精品在线播放| 成人在线一区二区三区| 国产精品网曝门| 午夜免费久久看| 欧美一区国产二区| 亚洲日本中文字幕免费在线不卡| 欧美大胆在线视频| 国产欧美亚洲精品| 快播日韩欧美| 国产一区 在线播放| 成年人视频网站免费观看| 国产视频97| 成人在线播放视频| 欧美大胆a人体大胆做受| 精品视频在线观看网站| 不卡在线一区二区| 亚洲一级黄色| 国产综合色产在线精品| 国产女主播视频一区二区| 同产精品九九九| 日韩欧美国产小视频| 日韩在线激情视频| 国产精品国语对白| 欧美日本韩国国产| 久久精品国产精品亚洲色婷婷| 国产jizz| 性欧美video高清bbw| 国产精品国产亚洲精品| 国产精品二区不卡| 激情都市一区二区| 亚洲欧洲韩国日本视频| 欧美日韩一二三区| 色偷偷噜噜噜亚洲男人的天堂| 国产成人亚洲精品| 亚洲精品成人自拍| 亚洲这里只有精品| 男人影院在线观看| 国产精品亚洲四区在线观看|