国产夫妻在线播放_精品久久国产97色综合_麻豆精品视频在线观看视频_青草青草久热精品视频在线网站_av资源在线_亚洲国产精品久久不卡毛片_成人黄色大片网站_黄色欧美日韩_欧美性一区二区三区_美女视频免费观看网站在线_亚洲精品无吗_狠狠躁夜夜躁久久躁别揉

Crack Exlce by yourself word、pdf、 Compressed Password Tutorial

2024-12-25 15:15:13

Brief introduction

Hashcat is the self-proclaimed fastest password recovery tool in the world. It had a proprietary codebase until 2015 but is now released as freeware. Versions for Linux, OS X, and Windows can use either CPU-based or GPU-based variants. Hash algorithms that support hashcat include Microsoft LM hash, MD4, MD5, SHA series, Unix encryption format, MySQL and Cisco PIX.
HashCat supports a variety of computing cores:

GPU
CPU
APU
DSP
FPGA
Coprocessor

GPU driver requirements


AMD GPUs on Linux require "RadeonOpenCompute (ROCm)" Software Platform (1.6.180 or later)
AMD GPUs on Windows require "AMD Radeon Software Crimson Edition" (15.12 or later)
Intel CPUs require "OpenCL Runtime for Intel Core and Intel Xeon Processors" (16.1.1 or later)
Intel GPUs on Linux require "OpenCL 2.0 GPU Driver Package for Linux" (2.0 or later)
Intel GPUs on Windows require "OpenCL Driver for Intel Iris and Intel HD Graphics"
NVIDIA GPUs require "NVIDIA Driver" (367.x or later)

最新版hashcat下載地址:https://hashcat.net/files/hashcat-5.1.0.7z
GitHub地址:https://github.com/hashcat/hashcat

parameter

The following are common parameters, if you want to know more parameters you can hashcat --help view

-a  指定要使用的破解模式,其值參考后面對參數(shù)。“-a 0”字典攻擊,“-a 1” 組合攻擊;“-a 3”掩碼攻擊。
-m  指定要破解的hash類型,如果不指定類型,則默認(rèn)是MD5
-o  指定破解成功后的hash及所對應(yīng)的明文密碼的存放位置,可以用它把破解成功的hash寫到指定的文件中
--force 忽略破解過程中的警告信息,跑單條hash可能需要加上此選項(xiàng)
--show  顯示已經(jīng)破解的hash及該hash所對應(yīng)的明文
--increment  啟用增量破解模式,你可以利用此模式讓hashcat在指定的密碼長度范圍內(nèi)執(zhí)行破解過程
--increment-min  密碼最小長度,后面直接等于一個(gè)整數(shù)即可,配置increment模式一起使用
--increment-max  密碼最大長度,同上
--outfile-format 指定破解結(jié)果的輸出格式id,默認(rèn)是3
--username   忽略hash文件中的指定的用戶名,在破解linux系統(tǒng)用戶密碼hash可能會(huì)用到
--remove     刪除已被破解成功的hash
-r       使用自定義破解規(guī)則

Attack Patterns:

# | Mode
 ===+======
  0 | Straight(字段破解)
  1 | Combination(組合破解)
  3 | Brute-force(掩碼暴力破解)
  6 | Hybrid Wordlist + Mask(字典+掩碼破解)
  7 | Hybrid Mask + Wordlist(掩碼+字典破解)

Output format

1 = hash[:salt]
2 = plain
3 = hash[:salt]:plain
4 = hex_plain
5 = hash[:salt]:hex_plain
6 = plain:hex_plain
7 = hash[:salt]:plain:hex_plain
8 = crackpos
9 = hash[:salt]:crackpos
10 = plain:crackpos
11 = hash[:salt]:plain:crackpos
12 = hex_plain:crackpos
13 = hash[:salt]:hex_plain:crackpos
14 = plain:hex_plain:crackpos
15 = hash[:salt]:plain:hex_plain:crackpos

Hash ID comparison table

Because there are so many, I will post some common hash types, if you want to know all the parameters, you can go to the hashcat wiki to see, or directly hashcat --help to view the hash comparison table

- [ Hash modes ] -

      # | Name                                             | Category
  ======+==================================================+======================================
    900 | MD4                                              | Raw Hash
      0 | MD5                                              | Raw Hash
   5100 | Half MD5                                         | Raw Hash
    100 | SHA1                                             | Raw Hash
   1300 | SHA2-224                                         | Raw Hash
   1400 | SHA2-256                                         | Raw Hash
  10800 | SHA2-384                                         | Raw Hash
   1700 | SHA2-512                                         | Raw Hash
  17300 | SHA3-224                                         | Raw Hash
  17400 | SHA3-256                                         | Raw Hash
  17500 | SHA3-384                                         | Raw Hash
  17600 | SHA3-512                                         | Raw Hash
     10 | md5($pass.$salt)                                 | Raw Hash, Salted and/or Iterated
     20 | md5($salt.$pass)                                 | Raw Hash, Salted and/or Iterated
     30 | md5(utf16le($pass).$salt)                        | Raw Hash, Salted and/or Iterated
     40 | md5($salt.utf16le($pass))                        | Raw Hash, Salted and/or Iterated
   3800 | md5($salt.$pass.$salt)                           | Raw Hash, Salted and/or Iterated
   3710 | md5($salt.md5($pass))                            | Raw Hash, Salted and/or Iterated
   4010 | md5($salt.md5($salt.$pass))                      | Raw Hash, Salted and/or Iterated
   4110 | md5($salt.md5($pass.$salt))                      | Raw Hash, Salted and/or Iterated
   2600 | md5(md5($pass))                                  | Raw Hash, Salted and/or Iterated
   3910 | md5(md5($pass).md5($salt))                       | Raw Hash, Salted and/or Iterated
   4300 | md5(strtoupper(md5($pass)))                      | Raw Hash, Salted and/or Iterated
   4400 | md5(sha1($pass))                                 | Raw Hash, Salted and/or Iterated
    110 | sha1($pass.$salt)                                | Raw Hash, Salted and/or Iterated
    120 | sha1($salt.$pass)                                | Raw Hash, Salted and/or Iterated
    130 | sha1(utf16le($pass).$salt)                       | Raw Hash, Salted and/or Iterated
    140 | sha1($salt.utf16le($pass))                       | Raw Hash, Salted and/or Iterated
   4500 | sha1(sha1($pass))                                | Raw Hash, Salted and/or Iterated
   4520 | sha1($salt.sha1($pass))                          | Raw Hash, Salted and/or Iterated
   4700 | sha1(md5($pass))                                 | Raw Hash, Salted and/or Iterated
   4900 | sha1($salt.$pass.$salt)                          | Raw Hash, Salted and/or Iterated
  14400 | sha1(CX)                                         | Raw Hash, Salted and/or Iterated
   1410 | sha256($pass.$salt)                              | Raw Hash, Salted and/or Iterated
   1420 | sha256($salt.$pass)                              | Raw Hash, Salted and/or Iterated
   1430 | sha256(utf16le($pass).$salt)                     | Raw Hash, Salted and/or Iterated
   1440 | sha256($salt.utf16le($pass))                     | Raw Hash, Salted and/or Iterated
   1710 | sha512($pass.$salt)                              | Raw Hash, Salted and/or Iterated
   1720 | sha512($salt.$pass)                              | Raw Hash, Salted and/or Iterated
   1730 | sha512(utf16le($pass).$salt)                     | Raw Hash, Salted and/or Iterated
   1740 | sha512($salt.utf16le($pass))                     | Raw Hash, Salted and/or Iterated
  14000 | DES (PT = $salt, key = $pass)                    | Raw Cipher, Known-Plaintext attack
  14100 | 3DES (PT = $salt, key = $pass)                   | Raw Cipher, Known-Plaintext attack
  14900 | Skip32 (PT = $salt, key = $pass)                 | Raw Cipher, Known-Plaintext attack
  15400 | ChaCha20                                         | Raw Cipher, Known-Plaintext attack
   2500 | WPA-EAPOL-PBKDF2                                 | Network Protocols
   2501 | WPA-EAPOL-PMK                                    | Network Protocols
  16800 | WPA-PMKID-PBKDF2                                 | Network Protocols
  16801 | WPA-PMKID-PMK                                    | Network Protocols
   7300 | IPMI2 RAKP HMAC-SHA1                             | Network Protocols
   7500 | Kerberos 5 AS-REQ Pre-Auth etype 23              | Network Protocols
   8300 | DNSSEC (NSEC3)                                   | Network Protocols
  10200 | CRAM-MD5                                         | Network Protocols
  11100 | PostgreSQL CRAM (MD5)                            | Network Protocols
  11200 | MySQL CRAM (SHA1)                                | Network Protocols
  16100 | TACACS+                                          | Network Protocols
  16500 | JWT (JSON Web Token)                             | Network Protocols
    121 | SMF (Simple Machines Forum) > v1.1               | Forums, CMS, E-Commerce, Frameworks
    400 | phpBB3 (MD5)                                     | Forums, CMS, E-Commerce, Frameworks
   2811 | MyBB 1.2+                                        | Forums, CMS, E-Commerce, Frameworks
   2811 | IPB2+ (Invision Power Board)                     | Forums, CMS, E-Commerce, Frameworks
   8400 | WBB3 (Woltlab Burning Board)                     | Forums, CMS, E-Commerce, Frameworks
     11 | Joomla < 2.5.18                                  | Forums, CMS, E-Commerce, Frameworks
    400 | Joomla >= 2.5.18 (MD5)                           | Forums, CMS, E-Commerce, Frameworks
    400 | WordPress (MD5)                                  | Forums, CMS, E-Commerce, Frameworks
   2612 | PHPS                                             | Forums, CMS, E-Commerce, Frameworks
   7900 | Drupal7                                          | Forums, CMS, E-Commerce, Frameworks
     21 | osCommerce                                       | Forums, CMS, E-Commerce, Frameworks
     21 | xt:Commerce                                      | Forums, CMS, E-Commerce, Frameworks
  11000 | PrestaShop                                       | Forums, CMS, E-Commerce, Frameworks
    124 | Django (SHA-1)                                   | Forums, CMS, E-Commerce, Frameworks
  10000 | Django (PBKDF2-SHA256)                           | Forums, CMS, E-Commerce, Frameworks
     12 | PostgreSQL                                       | Database Server
    131 | MSSQL (2000)                                     | Database Server
    132 | MSSQL (2005)                                     | Database Server
   1731 | MSSQL (2012, 2014)                               | Database Server
    200 | MySQL323                                         | Database Server
    300 | MySQL4.1/MySQL5                                  | Database Server
   3100 | Oracle H: Type (Oracle 7+)                       | Database Server
    112 | Oracle S: Type (Oracle 11+)                      | Database Server
  12300 | Oracle T: Type (Oracle 12+)                      | Database Server
   8000 | Sybase ASE                                       | Database Server
  15000 | FileZilla Server >= 0.9.55                       | FTP Server
  11500 | CRC32                                            | Checksums
   3000 | LM                                               | Operating Systems
   1000 | NTLM                                             | Operating Systems
    500 | md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)        | Operating Systems
   3200 | bcrypt $2*$, Blowfish (Unix)                     | Operating Systems
   7400 | sha256crypt $5$, SHA256 (Unix)                   | Operating Systems
   1800 | sha512crypt $6$, SHA512 (Unix)                   | Operating Systems
    122 | macOS v10.4, MacOS v10.5, MacOS v10.6            | Operating Systems
   1722 | macOS v10.7                                      | Operating Systems
   7100 | macOS v10.8+ (PBKDF2-SHA512)                     | Operating Systems
  11600 | 7-Zip                                            | Archives
  12500 | RAR3-hp                                          | Archives
  13000 | RAR5                                             | Archives
  13600 | WinZip                                           | Archives
   9700 | MS Office <= 2003 $0/$1, MD5 + RC4               | Documents
   9710 | MS Office <= 2003 $0/$1, MD5 + RC4, collider #1  | Documents
   9720 | MS Office <= 2003 $0/$1, MD5 + RC4, collider #2  | Documents
   9800 | MS Office <= 2003 $3/$4, SHA1 + RC4              | Documents
   9810 | MS Office <= 2003 $3, SHA1 + RC4, collider #1    | Documents
   9820 | MS Office <= 2003 $3, SHA1 + RC4, collider #2    | Documents
   9400 | MS Office 2007                                   | Documents
   9500 | MS Office 2010                                   | Documents
   9600 | MS Office 2013                                   | Documents
  10400 | PDF 1.1 - 1.3 (Acrobat 2 - 4)                    | Documents
  10410 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #1       | Documents
  10420 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #2       | Documents
  10500 | PDF 1.4 - 1.6 (Acrobat 5 - 8)                    | Documents
  10600 | PDF 1.7 Level 3 (Acrobat 9)                      | Documents
  10700 | PDF 1.7 Level 8 (Acrobat 10 - 11)                | Documents
  99999 | Plaintext                                        | Plaintext

Mask settings

Here is a list of common mask character sets

l | abcdefghijklmnopqrstuvwxyz          純小寫字母
u | ABCDEFGHIJKLMNOPQRSTUVWXYZ          純大寫字母
d | 0123456789                  純數(shù)字
h | 0123456789abcdef                常見小寫子目錄和數(shù)字
H | 0123456789ABCDEF                常見大寫字母和數(shù)字
s |  !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~       特殊字符
a | ?l?u?d?s                    鍵盤上所有可見的字符
b | 0x00 - 0xff                 可能是用來匹配像空格這種密碼的

下面舉幾個(gè)簡單的例子來了解一下掩碼的設(shè)置

八位數(shù)字密碼:?d?d?d?d?d?d?d?d
八位未知密碼:?a?a?a?a?a?a?a?a
前四位為大寫字母,后面四位為數(shù)字:?u?u?u?u?d?d?d?d
前四位為數(shù)字或者是小寫字母,后四位為大寫字母或者數(shù)字:?h?h?h?h?H?H?H?H
前三個(gè)字符未知,中間為admin,后三位未知:?a?a?aadmin?a?a?a
6-8位數(shù)字密碼:--increment --increment-min 6 --increment-max 8 ?l?l?l?l?l?l?l?l
6-8位數(shù)字+小寫字母密碼:--increment --increment-min 6 --increment-max 8 ?h?h?h?h?h?h?h?h

If we want to set the character set to: abcd123456!@-+, then how do we do that. This requires the use of a custom character set, and hashcat allows users to define up to 4 sets of character sets

--custom-charset1 [chars]等價(jià)于 -1
--custom-charset2 [chars]等價(jià)于 -2
--custom-charset3 [chars]等價(jià)于 -3
--custom-charset4 [chars]等價(jià)于 -4
在掩碼中用?1、?2、?3、?4來表示。

Here are a few more examples:

--custom-charset1 abcd123456!@-+。然后我們就可以用"?1"去表示這個(gè)字符集了
--custom-charset2 ?l?d,這里和?2就等價(jià)于?h
-1 ?d?l?u,?1就表示數(shù)字+小寫字母+大寫字母
-3 abcdef -4 123456 那么?3?3?3?3?4?4?4?4就表示為前四位可能是“abcdef”,后四位可能是“123456”

example

PS: I'll give you the configuration of my machine here, and then compare the speed of cracking

CPU:Intel(R) Core(TM) i5-7300HQ CPU @ 2.50GHz
顯卡:GTX 1050 Ti

7-digit number crack

hashcat64.exe -a 3 -m 0 --force 25c3e88f81b4853f2a8faacad4c871b6 ?d?d?d?d?d?d?d

長治網(wǎng)絡(luò)安全等級保護(hù),長治等保,長治網(wǎng)安備案,網(wǎng)站制作,網(wǎng)站建站,網(wǎng)站運(yùn)維,Linux系統(tǒng)運(yùn)維,Windows系統(tǒng)運(yùn)維,服務(wù)器運(yùn)維,環(huán)境部署,環(huán)境搭建,私有云存儲(chǔ)


7 Lowercase Letters Crack:

hashcat64.exe -a 3 -m 0 --force 7a47c6db227df60a6d67245d7d8063f3 ?l?l?l?l?l?l?l

1-8 digit crack:

hashcat64.exe -a 3 -m 0 --force 4488cec2aea535179e085367d8a17d75 --increment --increment-min 1 --increment-max 8 ?d?d?d?d?d?d?d?d

1-8 digits lowercase letters + numbers cracked

hashcat64.exe -a 3 -m 0 --force ab65d749cba1656ca11dfa1cc2383102 --increment --increment-min 1 --increment-max 8 ?h?h?h?h?h?h?h?h

Specific character marks: 123456abcdf!@+-

hashcat64.exe -a 3 -1 123456abcdf!@+- 8b78ba5089b11326290bc15cf0b9a07d ?1?1?1?1?1
注意一下:這里的-1和?1是數(shù)字1,不是字母l

1-8 is the set of bits: 123456abcdf!@+-

hashcat64.exe -a 3 -1 123456abcdf!@+- 9054fa315ce16f7f0955b4af06d1aa1b --increment --increment-min 1 --increment-max 8 ?1?1?1?1?1?1?1?1

1-8 digits + uppercase and lowercase letters + visible special symbols

hashcat64.exe -a 3 -1 ?d?u?l?s d37fc9ee39dd45a7717e3e3e9415f65d --increment --increment-min 1 --increment-max 8 ?1?1?1?1?1?1?1?1
或者:
hashcat64.exe -a 3 d37fc9ee39dd45a7717e3e3e9415f65d --increment --increment-min 1 --increment-max 8 ?a?a?a?a?a?a?a?a

Dictionary cracking

-a 0是指定字典破解模式,-o是輸出結(jié)果到文件中
hashcat64.exe -a 0 ede900ac1424436b55dc3c9f20cb97a8 password.txt -o result.txt

Batch cracking

hashcat64.exe -a 0 hash.txt password.txt -o result.txt

長治網(wǎng)絡(luò)安全等級保護(hù),長治等保,長治網(wǎng)安備案,網(wǎng)站制作,網(wǎng)站建站,網(wǎng)站運(yùn)維,Linux系統(tǒng)運(yùn)維,Windows系統(tǒng)運(yùn)維,服務(wù)器運(yùn)維,環(huán)境部署,環(huán)境搭建,私有云存儲(chǔ)

Dictionary Combo Crack:

hashcat64.exe -a 1 25f9e794323b453885f5181f1b624d0b pwd1.txt pwd2.txt

Dictionary + mask cracking

hashcat64.exe -a 6 9dc9d5ed5031367d42543763423c24ee password.txt ?l?l?l?l?l

Mysql4.1/5的PASSWORD函數(shù)


長治網(wǎng)絡(luò)安全等級保護(hù),長治等保,長治網(wǎng)安備案,網(wǎng)站制作,網(wǎng)站建站,網(wǎng)站運(yùn)維,Linux系統(tǒng)運(yùn)維,Windows系統(tǒng)運(yùn)維,服務(wù)器運(yùn)維,環(huán)境部署,環(huán)境搭建,私有云存儲(chǔ)



hashcat64.exe -a 3 -m 300 --force 6BB4837EB74329105EE4568DDA7DC67ED2CA2AD9 ?d?d?d?d?d?d

sha512crypt $6$, SHA512 (Unix)破解

可以cat /etc/shadow獲取

hashcat64.exe -a 3 -m 1800 --force $6$mxuA5cdy$XZRk0CvnPFqOgVopqiPEFAFK72SogKVwwwp7gWaUOb7b6tVwfCpcSUsCEk64ktLLYmzyew/xd0O0hPG/yrm2X. ?l?l?l?l

Instead of sorting out the username, use --username

hashcat64.exe -a 3 -m 1800 --force qiyou:$6$QDq75ki3$jsKm7qTDHz/xBob0kF1Lp170Cgg0i5Tslf3JW/sm9k9Q916mBTyilU3PoOsbRdxV8TAmzvdgNjrCuhfg3jKMY1 ?l?l?l?l?l --username

Windows NT-hash,LM-hash破解

You can use saminside to get the values of NT-hash and LM-hash


NT-hash:
hashcat64.exe -a 3 -m 1000 209C6174DA490CAEB422F3FA5A7AE634 ?l?l?l?l?l
LM-hash:
hashcat64.exe -a 3 -m 3000 F0D412BD764FFE81AAD3B435B51404EE ?l?l?l?l?l

mssql

hashcat64.exe -a 3 -m 132 --force 0x01008c8006c224f71f6bf0036f78d863c3c4ff53f8c3c48edafb ?l?l?l?l?l?d?d?d

WordPress Password Hash Crack

The function in which the specific encryption script is in./wp-includes/class-phpass.phpHashPassword

hashcat64.exe -a 3 -m 400 --force $P$BYEYcHEj3vDhV1lwGBv6rpxurKOEWY/ ?d?d?d?d?d?d

discuz用戶密碼hash破解

其密碼加密方式md5(md5($pass).$salt)

hashcat64.exe -a 3 -m 2611 --force 14e1b600b1fd579f47433b88e8d85291: ?d?d?d?d?d?d

Crack RAR compression password

First of all, rar2john gets the hash value of the rar file and downloads it

獲取rar文件的hash值:rar2john.exe 1.rar
結(jié)果:
1.rar:$rar5$16$639e9ce8344c680da12e8bdd4346a6a3$15$a2b056a21a9836d8d48c2844d171b73d$8$04a52d2224ad082e

長治網(wǎng)絡(luò)安全等級保護(hù),長治等保,長治網(wǎng)安備案,網(wǎng)站制作,網(wǎng)站建站,網(wǎng)站運(yùn)維,Linux系統(tǒng)運(yùn)維,Windows系統(tǒng)運(yùn)維,服務(wù)器運(yùn)維,環(huán)境部署,環(huán)境搭建,私有云存儲(chǔ)

hashcat64.exe -a 3 -m 13000 --force $rar5$16$639e9ce8344c680da12e8bdd4346a6a3$15$a2b056a21a9836d8d48c2844d171b73d$8$04a52d2224ad082e ?d?d?d?d?d?d

長治網(wǎng)絡(luò)安全等級保護(hù),長治等保,長治網(wǎng)安備案,網(wǎng)站制作,網(wǎng)站建站,網(wǎng)站運(yùn)維,Linux系統(tǒng)運(yùn)維,Windows系統(tǒng)運(yùn)維,服務(wù)器運(yùn)維,環(huán)境部署,環(huán)境搭建,私有云存儲(chǔ)

Note:

hashcat 支持 RAR3-hp 和 RAR5,官方示例如下:

-m參數(shù)    類型      示例 hash
12500    RAR3-hp    $RAR3$*0*45109af8ab5f297a*adbf6c5385d7a40373e8f77d7b89d317
13000    RAR5       $rar5$16$74575567518807622265582327032280$15$f8b4064de34ac02ecabfe

zip密碼破解

用zip2john獲取文件的hash值:zip2john.exe 1.zip
結(jié)果:1.zip:$zip2$*0*3*0*554bb43ff71cb0cac76326f292119dfd*ff23*5*24b28885ee*d4fe362bb1e91319ab53*$/zip2$:::::1.zip-1.txt


長治網(wǎng)絡(luò)安全等級保護(hù),長治等保,長治網(wǎng)安備案,網(wǎng)站制作,網(wǎng)站建站,網(wǎng)站運(yùn)維,Linux系統(tǒng)運(yùn)維,Windows系統(tǒng)運(yùn)維,服務(wù)器運(yùn)維,環(huán)境部署,環(huán)境搭建,私有云存儲(chǔ)


hashcat64.exe -a 3 -m 13600 $zip2$*0*3*0*554bb43ff71cb0cac76326f292119dfd*ff23*5*24b28885ee*d4fe362bb1e91319ab53*$/zip2$ --force ?d?d?d?d?d?d


長治網(wǎng)絡(luò)安全等級保護(hù),長治等保,長治網(wǎng)安備案,網(wǎng)站制作,網(wǎng)站建站,網(wǎng)站運(yùn)維,Linux系統(tǒng)運(yùn)維,Windows系統(tǒng)運(yùn)維,服務(wù)器運(yùn)維,環(huán)境部署,環(huán)境搭建,私有云存儲(chǔ)


破解office密碼

獲取office的hash值:python office2john.py 11.docx
結(jié)果:11.docx:$office$*2013*100000*256*16*e4a3eb62e8d3576f861f9eded75e0525*9eeb35f0849a7800d48113440b4bbb9c*577f8d8b2e1c5f60fed76e62327b38d28f25230f6c7dfd66588d9ca8097aabb9


長治網(wǎng)絡(luò)安全等級保護(hù),長治等保,長治網(wǎng)安備案,網(wǎng)站制作,網(wǎng)站建站,網(wǎng)站運(yùn)維,Linux系統(tǒng)運(yùn)維,Windows系統(tǒng)運(yùn)維,服務(wù)器運(yùn)維,環(huán)境部署,環(huán)境搭建,私有云存儲(chǔ)



hashcat64.exe -a 3 -m 9600 $office$*2013*100000*256*16*e4a3eb62e8d3576f861f9eded75e0525*9eeb35f0849a7800d48113440b4bbb9c*577f8d8b2e1c5f60fed76e62327b38d28f25230f6c7dfd66588d9ca8097aabb9 --force ?d?d?d?d?d?d



長治網(wǎng)絡(luò)安全等級保護(hù),長治等保,長治網(wǎng)安備案,網(wǎng)站制作,網(wǎng)站建站,網(wǎng)站運(yùn)維,Linux系統(tǒng)運(yùn)維,Windows系統(tǒng)運(yùn)維,服務(wù)器運(yùn)維,環(huán)境部署,環(huán)境搭建,私有云存儲(chǔ)



Crack the WIFI password

First of all, we will convert our handshake package to HCCAPX format, now the latest version of HashCAT only supports HCCAPX format, and the previous HCCAP format is no longer supported

官方在線轉(zhuǎn)化https://hashcat.net/cap2hccapx/
hashcat64.exe -a 3 -m 2500 1.hccapx 1391040?d?d?d?d


長治網(wǎng)絡(luò)安全等級保護(hù),長治等保,長治網(wǎng)安備案,網(wǎng)站制作,網(wǎng)站建站,網(wǎng)站運(yùn)維,Linux系統(tǒng)運(yùn)維,Windows系統(tǒng)運(yùn)維,服務(wù)器運(yùn)維,環(huán)境部署,環(huán)境搭建,私有云存儲(chǔ)



Others

  1. For cracked hash values, use View Resulthashcat64.exe hash --show

  2. All hash cracking results are in the hashcat.potfile file

  3. If the cracking time is too long, you can press the S key to check the cracking status, the P key to pause, the R key to continue cracking, and the Q key to exit the cracking.

  4. When using GPU mode for cracking, optimization can be done automatically using the -O parameter

  5. In the actual cracking, if we blindly crack it, it will take up a lot of our time and resources

    1.首先走一遍常用的弱口令字典
    2.組合密碼,如:zhang1999,用姓氏和出生年組合,當(dāng)然也可以用其它的組合,這里舉個(gè)例子而已
    3.把常用的掩碼組合整理起來放在masks中的.hcmask文件中,然后讓它自動(dòng)加載破解
    4.如果實(shí)在不行,你可以嘗試低位數(shù)的所有組合去跑,不過不建議太高位數(shù)的組合去破解,因?yàn)槿绻麑Ψ皆O(shè)置的密碼很復(fù)雜的話,到頭來你密碼沒有破解到,卻浪費(fèi)了大量的時(shí)間和資源,得不償失

    6.HashCat parameter optimizationConsidering
    the cracking speed of hashcat and the allocation of resources, we can configure
    some parameters: 1.Workload tuning.
    This parameter supports the following values: 1, 8, 40, 80, and 160

    --gpu-accel 160 可以讓GPU發(fā)揮最大性能。

    2. Gpu loops load fine-tuning
    : The range of values supported by this parameter is 8-1024 (some algorithms only support up to 1000).

    --gpu-loops 1024 可以讓GPU發(fā)揮最大性能。

    3.Segment size Dictionary cache size
    This parameter is to set the size of the memory cache, the function is to put the dictionary into the memory cache to speed up the dictionary cracking speed, the default is 32MB, you can set it according to your own memory situation, of course, the bigger the block.

    --segment-size 512 可以提高大字典破解的速度。


Previous:How to Improve the Success Rate of Password Cracking Technology
Next:Tutorial on cracking passwords using GPU graphics card performanc
日本在线观看一区| 国产视频自拍一区| 日韩一区二区三区高清| 色88888久久久久久影院| 精品区一区二区| 日本在线免费观看视频| 成人av在线资源| 国产亚洲欧美一区二区| 精品久久成人| 韩国欧美亚洲国产| 99视频这里有精品| 亚洲日韩中文字幕在线播放| 肉肉视频在线观看| 欧美日产国产精品| 欧美视频免费一区二区三区| 亚洲五码中文字幕| 韩国版免费三体| 国产精品天美传媒| 国产精品天天av精麻传媒| 国产成人精品亚洲777人妖 | 成人免费观看毛片| 久久国产综合精品| 国产自产在线视频一区| gogogo高清在线观看一区二区| 久久免费观看视频| 美日韩黄色大片| 国内精品视频一区| 巨人精品**| 91精品国产91久久久久久不卡| 亚洲图色一区二区三区| 波霸ol色综合久久| 久久夜夜操妹子| 日韩经典中文字幕在线观看| 国产网红在线观看| 日韩精品视频中文在线观看| 国产h片在线观看| 亚洲人线精品午夜| 涩涩涩久久久成人精品| 欧美激情xxxx性bbbb| 日本午夜精品| 国产欧美精品一区二区| 国内精品亚洲| 亚洲国产精品一区二区第一页 | 九色在线视频| 欧美日韩一区二区三区四区 | 国产免费拔擦拔擦8x在线播放| 国产福利一区在线观看| 一区二区三欧美| av成人网在线| 国内精品久久久久久久久电影网| 国产精品色婷婷| 中国成人亚色综合网站| 精品福利在线| 婷婷久久综合九色综合伊人色| 亚洲天堂2020| 亚洲自偷自拍熟女另类| 福利视频网站| 亚洲视频一区二区| 免费视频二区| 91久久一区二区| 成码无人av片在线观看网站| 精品成人一区二区三区四区| 成人小电影网站| 欧美人成在线视频| 91欧美大片| 亚洲一区二区在| 97超碰欧美中文字幕| 麻豆av在线| 欧美三级韩国三级日本三斤| 91禁在线看| 九色精品91| 国产一区二区三区日韩欧美| 三年中国国语在线播放免费| 日韩欧美国产精品综合嫩v| 伊人久久久久久久久久久| 国产精品jizz在线观看美国| 亚洲综合成人婷婷小说| 久久97超碰国产精品超碰| 激情综合网俺也去| 欧美三级中文字幕| av在线亚洲一区| 97伦理在线四区| 不卡视频一二三| 日本在线视频1区| 中文字幕精品一区久久久久| 999久久久国产精品| 中文字幕一区综合| 一区二区三区在线不卡| 99在线视频影院| 国产精品男女猛烈高潮激情| 六月丁香综合在线视频| 爆操欧美孕妇| 亚洲精品久久久久中文字幕欢迎你 | 色狠狠久久av五月综合|| 99视频有精品| av电影在线观看| 欧美激情在线狂野欧美精品| 日韩黄色小视频| 超碰96在线| 欧美成人在线免费视频| 久久成人国产| 欧美高清xxxxxkkkkk| 亚洲午夜女主播在线直播| 伊人影院久久| 黄色激情网站| 久久精品2019中文字幕| 国产欧美一区二区色老头| 男人艹女人网站| 日韩在线观看免费高清| 日韩不卡手机在线v区| 青青色在线视频| 欧美最猛性xxxxx亚洲精品| 成人综合婷婷国产精品久久 | 久久国产成人精品| 777精品久无码人妻蜜桃| 337p亚洲精品色噜噜| 日本电影一区二区| 四虎最新地址发布| 久久6精品影院| 国产精品一区二区久久精品爱涩 | av不卡在线| 中国动漫在线观看完整版免费| 欧美成人午夜激情视频| 国产激情一区二区三区四区| 成人在线观看免费| 91免费在线视频| 亚洲一区在线观看视频| 亚洲精品456| 高清av免费看| 欧美精品生活片| 99久久精品免费| 国产一区二区主播在线| 男人日女人的bb| 亚洲黄色有码视频| 日韩福利电影在线| a篇片在线观看网站| 国产亚洲精品美女久久久m| 在线影视一区二区三区| 欧美大片一区| 国产福利在线观看| 国产欧美日韩亚洲| 欧美精品在欧美一区二区少妇| 精品999日本| 免费日本一区二区三区视频| av一区和二区| 欧美顶级少妇做爰| 奇米888四色在线精品| yellow在线观看网址| 一区二区三区av在线| 亚洲欧美资源在线| 91丨porny丨国产| а√中文在线天堂精品| 三级短视频在线| 国产精品xxxxx| 欧美日韩色婷婷| 国产一区白浆| 亚洲精品福利电影| 日韩精品视频一区二区在线观看| 欧美国产第二页| 怡红院av一区二区三区| 先锋资源久久| 99视频免费在线观看| 久久久无码中文字幕久...| 日韩专区在线播放| 国产精品国产精品国产专区不蜜| 国产不卡av一区二区| 免费黄色片在线观看| 日韩免费av一区二区三区| 亚洲系列中文字幕| 国产精品白丝在线| 亚洲欧美伊人| 日韩激情av| 伊人成色综合网| 国产精品91一区| 日本精品视频一区二区| 日本麻豆一区二区三区视频| 123成人网| 波多野结衣在线| 亚洲国产精品视频一区| 久久电影一区二区| 欧美日韩国产黄| 老色鬼精品视频在线观看播放| 日本成人一区二区| 一级视频在线观看视频在线啦啦| 蜜桃欧美视频| 欧美精品一区二区免费| 五月婷婷综合网| 国产在线播放一区三区四| 精品网站aaa| 国产最新在线| 午夜欧美福利视频| 精品一区二区不卡| 久久国产精品影片| 欧美午夜电影网| 久久久亚洲精品一区二区三区| 国产字幕视频一区二区| 精品国模一区二区三区欧美 | 国产福利一区二区三区| 亚洲桃色综合影院| 色偷偷偷在线视频播放|