Hashcat je open-source software pro prolamování hesel, který dokáže prolamovat různé hashe pomocí různých způsobů útoku.
Podporuje pět jedinečných způsobů útoku pro více než 300 vysoce optimalizovaných hashovacích algoritmů.
V současné době podporuje CPU, GPU a další hardwarové akcelerátory v Linuxu. Tento nástroj lze také použít na macOS a Windows.
Instalace nástroje
Tento nástroj je součástí distribuce Kali Linux.
sudo apt install hashcat
Možnosti které nástroj nabízí
hashcat --help
hashcat (v6.2.6) starting in help mode
Usage: hashcat [options]... hash|hashfile|hccapxfile [dictionary|mask|directory]...
- [ Options ] -
Options Short / Long | Type | Description | Example
================================+======+======================================================+=======================
-m, --hash-type | Num | Hash-type, references below (otherwise autodetect) | -m 1000
-a, --attack-mode | Num | Attack-mode, see references below | -a 3
-V, --version | | Print version |
-h, --help | | Print help |
--quiet | | Suppress output |
--hex-charset | | Assume charset is given in hex |
--hex-salt | | Assume salt is given in hex |
--hex-wordlist | | Assume words in wordlist are given in hex |
--force | | Ignore warnings |
--deprecated-check-disable | | Enable deprecated plugins |
--status | | Enable automatic update of the status screen |
--status-json | | Enable JSON format for status output |
--status-timer | Num | Sets seconds between status screen updates to X | --status-timer=1
--stdin-timeout-abort | Num | Abort if there is no input from stdin for X seconds | --stdin-timeout-abort=300
--machine-readable | | Display the status view in a machine-readable format |
--keep-guessing | | Keep guessing the hash after it has been cracked |
--self-test-disable | | Disable self-test functionality on startup |
--loopback | | Add new plains to induct directory |
--markov-hcstat2 | File | Specify hcstat2 file to use | --markov-hcstat2=my.hcstat2
--markov-disable | | Disables markov-chains, emulates classic brute-force |
--markov-classic | | Enables classic markov-chains, no per-position |
--markov-inverse | | Enables inverse markov-chains, no per-position |
-t, --markov-threshold | Num | Threshold X when to stop accepting new markov-chains | -t 50
--runtime | Num | Abort session after X seconds of runtime | --runtime=10
--session | Str | Define specific session name | --session=mysession
--restore | | Restore session from --session |
--restore-disable | | Do not write restore file |
--restore-file-path | File | Specific path to restore file | --restore-file-path=x.restore
-o, --outfile | File | Define outfile for recovered hash | -o outfile.txt
--outfile-format | Str | Outfile format to use, separated with commas | --outfile-format=1,3
--outfile-autohex-disable | | Disable the use of $HEX[] in output plains |
--outfile-check-timer | Num | Sets seconds between outfile checks to X | --outfile-check-timer=30
--wordlist-autohex-disable | | Disable the conversion of $HEX[] from the wordlist |
-p, --separator | Char | Separator char for hashlists and outfile | -p :
--stdout | | Do not crack a hash, instead print candidates only |
--show | | Compare hashlist with potfile; show cracked hashes |
--left | | Compare hashlist with potfile; show uncracked hashes |
--username | | Enable ignoring of usernames in hashfile |
--remove | | Enable removal of hashes once they are cracked |
--remove-timer | Num | Update input hash file each X seconds | --remove-timer=30
--potfile-disable | | Do not write potfile |
--potfile-path | File | Specific path to potfile | --potfile-path=my.pot
--encoding-from | Code | Force internal wordlist encoding from X | --encoding-from=iso-8859-15
--encoding-to | Code | Force internal wordlist encoding to X | --encoding-to=utf-32le
--debug-mode | Num | Defines the debug mode (hybrid only by using rules) | --debug-mode=4
--debug-file | File | Output file for debugging rules | --debug-file=good.log
--induction-dir | Dir | Specify the induction directory to use for loopback | --induction=inducts
--outfile-check-dir | Dir | Specify the outfile directory to monitor for plains | --outfile-check-dir=x
--logfile-disable | | Disable the logfile |
--hccapx-message-pair | Num | Load only message pairs from hccapx matching X | --hccapx-message-pair=2
--nonce-error-corrections | Num | The BF size range to replace AP´s nonce last bytes | --nonce-error-corrections=16
--keyboard-layout-mapping | File | Keyboard layout mapping table for special hash-modes | --keyb=german.hckmap
--truecrypt-keyfiles | File | Keyfiles to use, separated with commas | --truecrypt-keyf=x.png
--veracrypt-keyfiles | File | Keyfiles to use, separated with commas | --veracrypt-keyf=x.txt
--veracrypt-pim-start | Num | VeraCrypt personal iterations multiplier start | --veracrypt-pim-start=450
--veracrypt-pim-stop | Num | VeraCrypt personal iterations multiplier stop | --veracrypt-pim-stop=500
-b, --benchmark | | Run benchmark of selected hash-modes |
--benchmark-all | | Run benchmark of all hash-modes (requires -b) |
--speed-only | | Return expected speed of the attack, then quit |
--progress-only | | Return ideal progress step size and time to process |
-c, --segment-size | Num | Sets size in MB to cache from the wordfile to X | -c 32
--bitmap-min | Num | Sets minimum bits allowed for bitmaps to X | --bitmap-min=24
--bitmap-max | Num | Sets maximum bits allowed for bitmaps to X | --bitmap-max=24
--cpu-affinity | Str | Locks to CPU devices, separated with commas | --cpu-affinity=1,2,3
--hook-threads | Num | Sets number of threads for a hook (per compute unit) | --hook-threads=8
--hash-info | | Show information for each hash-mode |
--example-hashes | | Alias of --hash-info |
--backend-ignore-cuda | | Do not try to open CUDA interface on startup |
--backend-ignore-hip | | Do not try to open HIP interface on startup |
--backend-ignore-metal | | Do not try to open Metal interface on startup |
--backend-ignore-opencl | | Do not try to open OpenCL interface on startup |
-I, --backend-info | | Show system/evironment/backend API info | -I or -II
-d, --backend-devices | Str | Backend devices to use, separated with commas | -d 1
-D, --opencl-device-types | Str | OpenCL device-types to use, separated with commas | -D 1
-O, --optimized-kernel-enable | | Enable optimized kernels (limits password length) |
-M, --multiply-accel-disable | | Disable multiply kernel-accel with processor count |
-w, --workload-profile | Num | Enable a specific workload profile, see pool below | -w 3
-n, --kernel-accel | Num | Manual workload tuning, set outerloop step size to X | -n 64
-u, --kernel-loops | Num | Manual workload tuning, set innerloop step size to X | -u 256
-T, --kernel-threads | Num | Manual workload tuning, set thread count to X | -T 64
--backend-vector-width | Num | Manually override backend vector-width to X | --backend-vector=4
--spin-damp | Num | Use CPU for device synchronization, in percent | --spin-damp=10
--hwmon-disable | | Disable temperature and fanspeed reads and triggers |
--hwmon-temp-abort | Num | Abort if temperature reaches X degrees Celsius | --hwmon-temp-abort=100
--scrypt-tmto | Num | Manually override TMTO value for scrypt to X | --scrypt-tmto=3
-s, --skip | Num | Skip X words from the start | -s 1000000
-l, --limit | Num | Limit X words from the start + skipped words | -l 1000000
--keyspace | | Show keyspace base:mod values and quit |
-j, --rule-left | Rule | Single rule applied to each word from left wordlist | -j 'c'
-k, --rule-right | Rule | Single rule applied to each word from right wordlist | -k '^-'
-r, --rules-file | File | Multiple rules applied to each word from wordlists | -r rules/best64.rule
-g, --generate-rules | Num | Generate X random rules | -g 10000
--generate-rules-func-min | Num | Force min X functions per rule |
--generate-rules-func-max | Num | Force max X functions per rule |
--generate-rules-func-sel | Str | Pool of rule operators valid for random rule engine | --generate-rules-func-sel=ioTlc
--generate-rules-seed | Num | Force RNG seed set to X |
-1, --custom-charset1 | CS | User-defined charset ?1 | -1 ?l?d?u
-2, --custom-charset2 | CS | User-defined charset ?2 | -2 ?l?d?s
-3, --custom-charset3 | CS | User-defined charset ?3 |
-4, --custom-charset4 | CS | User-defined charset ?4 |
--identify | | Shows all supported algorithms for input hashes | --identify my.hash
-i, --increment | | Enable mask increment mode |
--increment-min | Num | Start mask incrementing at X | --increment-min=4
--increment-max | Num | Stop mask incrementing at X | --increment-max=8
-S, --slow-candidates | | Enable slower (but advanced) candidate generators |
--brain-server | | Enable brain server |
--brain-server-timer | Num | Update the brain server dump each X seconds (min:60) | --brain-server-timer=300
-z, --brain-client | | Enable brain client, activates -S |
--brain-client-features | Num | Define brain client features, see below | --brain-client-features=3
--brain-host | Str | Brain server host (IP or domain) | --brain-host=127.0.0.1
--brain-port | Port | Brain server port | --brain-port=13743
--brain-password | Str | Brain server authentication password | --brain-password=bZfhCvGUSjRq
--brain-session | Hex | Overrides automatically calculated brain session | --brain-session=0x2ae611db
--brain-session-whitelist | Hex | Allow given sessions only, separated with commas | --brain-session-whitelist=0x2ae611db
- [ Hash modes ] -
# | Name | Category
======+============================================================+======================================
900 | MD4 | Raw Hash
0 | MD5 | Raw Hash
100 | SHA1 | Raw Hash
1300 | SHA2-224 | Raw Hash
1400 | SHA2-256 | Raw Hash
10800 | SHA2-384 | Raw Hash
1700 | SHA2-512 | Raw Hash
17300 | SHA3-224 | Raw Hash
17400 | SHA3-256 | Raw Hash
17500 | SHA3-384 | Raw Hash
17600 | SHA3-512 | Raw Hash
6000 | RIPEMD-160 | Raw Hash
600 | BLAKE2b-512 | Raw Hash
11700 | GOST R 34.11-2012 (Streebog) 256-bit, big-endian | Raw Hash
11800 | GOST R 34.11-2012 (Streebog) 512-bit, big-endian | Raw Hash
6900 | GOST R 34.11-94 | Raw Hash
17010 | GPG (AES-128/AES-256 (SHA-1($pass))) | Raw Hash
5100 | Half MD5 | Raw Hash
17700 | Keccak-224 | Raw Hash
17800 | Keccak-256 | Raw Hash
17900 | Keccak-384 | Raw Hash
18000 | Keccak-512 | Raw Hash
6100 | Whirlpool | Raw Hash
10100 | SipHash | Raw Hash
70 | md5(utf16le($pass)) | Raw Hash
170 | sha1(utf16le($pass)) | Raw Hash
1470 | sha256(utf16le($pass)) | Raw Hash
10870 | sha384(utf16le($pass)) | Raw Hash
1770 | sha512(utf16le($pass)) | Raw Hash
610 | BLAKE2b-512($pass.$salt) | Raw Hash salted and/or iterated
620 | BLAKE2b-512($salt.$pass) | Raw Hash salted and/or iterated
10 | md5($pass.$salt) | Raw Hash salted and/or iterated
20 | md5($salt.$pass) | Raw Hash salted and/or iterated
3800 | md5($salt.$pass.$salt) | Raw Hash salted and/or iterated
3710 | md5($salt.md5($pass)) | Raw Hash salted and/or iterated
4110 | md5($salt.md5($pass.$salt)) | Raw Hash salted and/or iterated
4010 | md5($salt.md5($salt.$pass)) | Raw Hash salted and/or iterated
21300 | md5($salt.sha1($salt.$pass)) | Raw Hash salted and/or iterated
40 | md5($salt.utf16le($pass)) | Raw Hash salted and/or iterated
2600 | md5(md5($pass)) | Raw Hash salted and/or iterated
3910 | md5(md5($pass).md5($salt)) | Raw Hash salted and/or iterated
3500 | md5(md5(md5($pass))) | Raw Hash salted and/or iterated
4400 | md5(sha1($pass)) | Raw Hash salted and/or iterated
4410 | md5(sha1($pass).$salt) | Raw Hash salted and/or iterated
20900 | md5(sha1($pass).md5($pass).sha1($pass)) | Raw Hash salted and/or iterated
21200 | md5(sha1($salt).md5($pass)) | Raw Hash salted and/or iterated
4300 | md5(strtoupper(md5($pass))) | Raw Hash salted and/or iterated
30 | md5(utf16le($pass).$salt) | Raw Hash salted and/or iterated
110 | sha1($pass.$salt) | Raw Hash salted and/or iterated
120 | sha1($salt.$pass) | Raw Hash salted and/or iterated
4900 | sha1($salt.$pass.$salt) | Raw Hash salted and/or iterated
4520 | sha1($salt.sha1($pass)) | Raw Hash salted and/or iterated
24300 | sha1($salt.sha1($pass.$salt)) | Raw Hash salted and/or iterated
140 | sha1($salt.utf16le($pass)) | Raw Hash salted and/or iterated
19300 | sha1($salt1.$pass.$salt2) | Raw Hash salted and/or iterated
14400 | sha1(CX) | Raw Hash salted and/or iterated
4700 | sha1(md5($pass)) | Raw Hash salted and/or iterated
4710 | sha1(md5($pass).$salt) | Raw Hash salted and/or iterated
21100 | sha1(md5($pass.$salt)) | Raw Hash salted and/or iterated
18500 | sha1(md5(md5($pass))) | Raw Hash salted and/or iterated
4500 | sha1(sha1($pass)) | Raw Hash salted and/or iterated
4510 | sha1(sha1($pass).$salt) | Raw Hash salted and/or iterated
5000 | sha1(sha1($salt.$pass.$salt)) | Raw Hash salted and/or iterated
130 | sha1(utf16le($pass).$salt) | Raw Hash salted and/or iterated
1410 | sha256($pass.$salt) | Raw Hash salted and/or iterated
1420 | sha256($salt.$pass) | Raw Hash salted and/or iterated
22300 | sha256($salt.$pass.$salt) | Raw Hash salted and/or iterated
20720 | sha256($salt.sha256($pass)) | Raw Hash salted and/or iterated
21420 | sha256($salt.sha256_bin($pass)) | Raw Hash salted and/or iterated
1440 | sha256($salt.utf16le($pass)) | Raw Hash salted and/or iterated
20800 | sha256(md5($pass)) | Raw Hash salted and/or iterated
20710 | sha256(sha256($pass).$salt) | Raw Hash salted and/or iterated
21400 | sha256(sha256_bin($pass)) | Raw Hash salted and/or iterated
1430 | sha256(utf16le($pass).$salt) | Raw Hash salted and/or iterated
10810 | sha384($pass.$salt) | Raw Hash salted and/or iterated
10820 | sha384($salt.$pass) | Raw Hash salted and/or iterated
10840 | sha384($salt.utf16le($pass)) | Raw Hash salted and/or iterated
10830 | sha384(utf16le($pass).$salt) | Raw Hash salted and/or iterated
1710 | sha512($pass.$salt) | Raw Hash salted and/or iterated
1720 | sha512($salt.$pass) | Raw Hash salted and/or iterated
1740 | sha512($salt.utf16le($pass)) | Raw Hash salted and/or iterated
1730 | sha512(utf16le($pass).$salt) | Raw Hash salted and/or iterated
50 | HMAC-MD5 (key = $pass) | Raw Hash authenticated
60 | HMAC-MD5 (key = $salt) | Raw Hash authenticated
150 | HMAC-SHA1 (key = $pass) | Raw Hash authenticated
160 | HMAC-SHA1 (key = $salt) | Raw Hash authenticated
1450 | HMAC-SHA256 (key = $pass) | Raw Hash authenticated
1460 | HMAC-SHA256 (key = $salt) | Raw Hash authenticated
1750 | HMAC-SHA512 (key = $pass) | Raw Hash authenticated
1760 | HMAC-SHA512 (key = $salt) | Raw Hash authenticated
11750 | HMAC-Streebog-256 (key = $pass), big-endian | Raw Hash authenticated
11760 | HMAC-Streebog-256 (key = $salt), big-endian | Raw Hash authenticated
11850 | HMAC-Streebog-512 (key = $pass), big-endian | Raw Hash authenticated
11860 | HMAC-Streebog-512 (key = $salt), big-endian | Raw Hash authenticated
28700 | Amazon AWS4-HMAC-SHA256 | Raw Hash authenticated
11500 | CRC32 | Raw Checksum
27900 | CRC32C | Raw Checksum
28000 | CRC64Jones | Raw Checksum
18700 | Java Object hashCode() | Raw Checksum
25700 | MurmurHash | Raw Checksum
27800 | MurmurHash3 | Raw Checksum
14100 | 3DES (PT = $salt, key = $pass) | Raw Cipher, Known-plaintext attack
14000 | DES (PT = $salt, key = $pass) | Raw Cipher, Known-plaintext attack
26401 | AES-128-ECB NOKDF (PT = $salt, key = $pass) | Raw Cipher, Known-plaintext attack
26402 | AES-192-ECB NOKDF (PT = $salt, key = $pass) | Raw Cipher, Known-plaintext attack
26403 | AES-256-ECB NOKDF (PT = $salt, key = $pass) | Raw Cipher, Known-plaintext attack
15400 | ChaCha20 | Raw Cipher, Known-plaintext attack
14500 | Linux Kernel Crypto API (2.4) | Raw Cipher, Known-plaintext attack
14900 | Skip32 (PT = $salt, key = $pass) | Raw Cipher, Known-plaintext attack
11900 | PBKDF2-HMAC-MD5 | Generic KDF
12000 | PBKDF2-HMAC-SHA1 | Generic KDF
10900 | PBKDF2-HMAC-SHA256 | Generic KDF
12100 | PBKDF2-HMAC-SHA512 | Generic KDF
8900 | scrypt | Generic KDF
400 | phpass | Generic KDF
16100 | TACACS+ | Network Protocol
11400 | SIP digest authentication (MD5) | Network Protocol
5300 | IKE-PSK MD5 | Network Protocol
5400 | IKE-PSK SHA1 | Network Protocol
25100 | SNMPv3 HMAC-MD5-96 | Network Protocol
25000 | SNMPv3 HMAC-MD5-96/HMAC-SHA1-96 | Network Protocol
25200 | SNMPv3 HMAC-SHA1-96 | Network Protocol
26700 | SNMPv3 HMAC-SHA224-128 | Network Protocol
26800 | SNMPv3 HMAC-SHA256-192 | Network Protocol
26900 | SNMPv3 HMAC-SHA384-256 | Network Protocol
27300 | SNMPv3 HMAC-SHA512-384 | Network Protocol
2500 | WPA-EAPOL-PBKDF2 | Network Protocol
2501 | WPA-EAPOL-PMK | Network Protocol
22000 | WPA-PBKDF2-PMKID+EAPOL | Network Protocol
22001 | WPA-PMK-PMKID+EAPOL | Network Protocol
16800 | WPA-PMKID-PBKDF2 | Network Protocol
16801 | WPA-PMKID-PMK | Network Protocol
7300 | IPMI2 RAKP HMAC-SHA1 | Network Protocol
10200 | CRAM-MD5 | Network Protocol
16500 | JWT (JSON Web Token) | Network Protocol
29200 | Radmin3 | Network Protocol
19600 | Kerberos 5, etype 17, TGS-REP | Network Protocol
19800 | Kerberos 5, etype 17, Pre-Auth | Network Protocol
28800 | Kerberos 5, etype 17, DB | Network Protocol
19700 | Kerberos 5, etype 18, TGS-REP | Network Protocol
19900 | Kerberos 5, etype 18, Pre-Auth | Network Protocol
28900 | Kerberos 5, etype 18, DB | Network Protocol
7500 | Kerberos 5, etype 23, AS-REQ Pre-Auth | Network Protocol
13100 | Kerberos 5, etype 23, TGS-REP | Network Protocol
18200 | Kerberos 5, etype 23, AS-REP | Network Protocol
5500 | NetNTLMv1 / NetNTLMv1+ESS | Network Protocol
27000 | NetNTLMv1 / NetNTLMv1+ESS (NT) | Network Protocol
5600 | NetNTLMv2 | Network Protocol
27100 | NetNTLMv2 (NT) | Network Protocol
29100 | Flask Session Cookie ($salt.$salt.$pass) | Network Protocol
4800 | iSCSI CHAP authentication, MD5(CHAP) | Network Protocol
8500 | RACF | Operating System
6300 | AIX {smd5} | Operating System
6700 | AIX {ssha1} | Operating System
6400 | AIX {ssha256} | Operating System
6500 | AIX {ssha512} | Operating System
3000 | LM | Operating System
19000 | QNX /etc/shadow (MD5) | Operating System
19100 | QNX /etc/shadow (SHA256) | Operating System
19200 | QNX /etc/shadow (SHA512) | Operating System
15300 | DPAPI masterkey file v1 (context 1 and 2) | Operating System
15310 | DPAPI masterkey file v1 (context 3) | Operating System
15900 | DPAPI masterkey file v2 (context 1 and 2) | Operating System
15910 | DPAPI masterkey file v2 (context 3) | Operating System
7200 | GRUB 2 | Operating System
12800 | MS-AzureSync PBKDF2-HMAC-SHA256 | Operating System
12400 | BSDi Crypt, Extended DES | Operating System
1000 | NTLM | Operating System
9900 | Radmin2 | Operating System
5800 | Samsung Android Password/PIN | Operating System
28100 | Windows Hello PIN/Password | Operating System
13800 | Windows Phone 8+ PIN/password | Operating System
2410 | Cisco-ASA MD5 | Operating System
9200 | Cisco-IOS $8$ (PBKDF2-SHA256) | Operating System
9300 | Cisco-IOS $9$ (scrypt) | Operating System
5700 | Cisco-IOS type 4 (SHA256) | Operating System
2400 | Cisco-PIX MD5 | Operating System
8100 | Citrix NetScaler (SHA1) | Operating System
22200 | Citrix NetScaler (SHA512) | Operating System
1100 | Domain Cached Credentials (DCC), MS Cache | Operating System
2100 | Domain Cached Credentials 2 (DCC2), MS Cache 2 | Operating System
7000 | FortiGate (FortiOS) | Operating System
26300 | FortiGate256 (FortiOS256) | Operating System
125 | ArubaOS | Operating System
501 | Juniper IVE | Operating System
22 | Juniper NetScreen/SSG (ScreenOS) | Operating System
15100 | Juniper/NetBSD sha1crypt | Operating System
26500 | iPhone passcode (UID key + System Keybag) | Operating System
122 | macOS v10.4, macOS v10.5, macOS v10.6 | Operating System
1722 | macOS v10.7 | Operating System
7100 | macOS v10.8+ (PBKDF2-SHA512) | Operating System
3200 | bcrypt $2*$, Blowfish (Unix) | Operating System
500 | md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5) | Operating System
1500 | descrypt, DES (Unix), Traditional DES | Operating System
29000 | sha1($salt.sha1(utf16le($username).':'.utf16le($pass))) | Operating System
7400 | sha256crypt $5$, SHA256 (Unix) | Operating System
1800 | sha512crypt $6$, SHA512 (Unix) | Operating System
24600 | SQLCipher | Database Server
131 | MSSQL (2000) | Database Server
132 | MSSQL (2005) | Database Server
1731 | MSSQL (2012, 2014) | Database Server
24100 | MongoDB ServerKey SCRAM-SHA-1 | Database Server
24200 | MongoDB ServerKey SCRAM-SHA-256 | Database Server
12 | PostgreSQL | Database Server
11100 | PostgreSQL CRAM (MD5) | Database Server
28600 | PostgreSQL SCRAM-SHA-256 | Database Server
3100 | Oracle H: Type (Oracle 7+) | Database Server
112 | Oracle S: Type (Oracle 11+) | Database Server
12300 | Oracle T: Type (Oracle 12+) | Database Server
7401 | MySQL $A$ (sha256crypt) | Database Server
11200 | MySQL CRAM (SHA1) | Database Server
200 | MySQL323 | Database Server
300 | MySQL4.1/MySQL5 | Database Server
8000 | Sybase ASE | Database Server
8300 | DNSSEC (NSEC3) | FTP, HTTP, SMTP, LDAP Server
25900 | KNX IP Secure - Device Authentication Code | FTP, HTTP, SMTP, LDAP Server
16400 | CRAM-MD5 Dovecot | FTP, HTTP, SMTP, LDAP Server
1411 | SSHA-256(Base64), LDAP {SSHA256} | FTP, HTTP, SMTP, LDAP Server
1711 | SSHA-512(Base64), LDAP {SSHA512} | FTP, HTTP, SMTP, LDAP Server
24900 | Dahua Authentication MD5 | FTP, HTTP, SMTP, LDAP Server
10901 | RedHat 389-DS LDAP (PBKDF2-HMAC-SHA256) | FTP, HTTP, SMTP, LDAP Server
15000 | FileZilla Server >= 0.9.55 | FTP, HTTP, SMTP, LDAP Server
12600 | ColdFusion 10+ | FTP, HTTP, SMTP, LDAP Server
1600 | Apache $apr1$ MD5, md5apr1, MD5 (APR) | FTP, HTTP, SMTP, LDAP Server
141 | Episerver 6.x < .NET 4 | FTP, HTTP, SMTP, LDAP Server
1441 | Episerver 6.x >= .NET 4 | FTP, HTTP, SMTP, LDAP Server
1421 | hMailServer | FTP, HTTP, SMTP, LDAP Server
101 | nsldap, SHA-1(Base64), Netscape LDAP SHA | FTP, HTTP, SMTP, LDAP Server
111 | nsldaps, SSHA-1(Base64), Netscape LDAP SSHA | FTP, HTTP, SMTP, LDAP Server
7700 | SAP CODVN B (BCODE) | Enterprise Application Software (EAS)
7701 | SAP CODVN B (BCODE) from RFC_READ_TABLE | Enterprise Application Software (EAS)
7800 | SAP CODVN F/G (PASSCODE) | Enterprise Application Software (EAS)
7801 | SAP CODVN F/G (PASSCODE) from RFC_READ_TABLE | Enterprise Application Software (EAS)
10300 | SAP CODVN H (PWDSALTEDHASH) iSSHA-1 | Enterprise Application Software (EAS)
133 | PeopleSoft | Enterprise Application Software (EAS)
13500 | PeopleSoft PS_TOKEN | Enterprise Application Software (EAS)
21500 | SolarWinds Orion | Enterprise Application Software (EAS)
21501 | SolarWinds Orion v2 | Enterprise Application Software (EAS)
24 | SolarWinds Serv-U | Enterprise Application Software (EAS)
8600 | Lotus Notes/Domino 5 | Enterprise Application Software (EAS)
8700 | Lotus Notes/Domino 6 | Enterprise Application Software (EAS)
9100 | Lotus Notes/Domino 8 | Enterprise Application Software (EAS)
26200 | OpenEdge Progress Encode | Enterprise Application Software (EAS)
20600 | Oracle Transportation Management (SHA256) | Enterprise Application Software (EAS)
4711 | Huawei sha1(md5($pass).$salt) | Enterprise Application Software (EAS)
20711 | AuthMe sha256 | Enterprise Application Software (EAS)
22400 | AES Crypt (SHA256) | Full-Disk Encryption (FDE)
27400 | VMware VMX (PBKDF2-HMAC-SHA1 + AES-256-CBC) | Full-Disk Encryption (FDE)
14600 | LUKS v1 (legacy) | Full-Disk Encryption (FDE)
29541 | LUKS v1 RIPEMD-160 + AES | Full-Disk Encryption (FDE)
29542 | LUKS v1 RIPEMD-160 + Serpent | Full-Disk Encryption (FDE)
29543 | LUKS v1 RIPEMD-160 + Twofish | Full-Disk Encryption (FDE)
29511 | LUKS v1 SHA-1 + AES | Full-Disk Encryption (FDE)
29512 | LUKS v1 SHA-1 + Serpent | Full-Disk Encryption (FDE)
29513 | LUKS v1 SHA-1 + Twofish | Full-Disk Encryption (FDE)
29521 | LUKS v1 SHA-256 + AES | Full-Disk Encryption (FDE)
29522 | LUKS v1 SHA-256 + Serpent | Full-Disk Encryption (FDE)
29523 | LUKS v1 SHA-256 + Twofish | Full-Disk Encryption (FDE)
29531 | LUKS v1 SHA-512 + AES | Full-Disk Encryption (FDE)
29532 | LUKS v1 SHA-512 + Serpent | Full-Disk Encryption (FDE)
29533 | LUKS v1 SHA-512 + Twofish | Full-Disk Encryption (FDE)
13711 | VeraCrypt RIPEMD160 + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)
13712 | VeraCrypt RIPEMD160 + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)
13713 | VeraCrypt RIPEMD160 + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)
13741 | VeraCrypt RIPEMD160 + XTS 512 bit + boot-mode (legacy) | Full-Disk Encryption (FDE)
13742 | VeraCrypt RIPEMD160 + XTS 1024 bit + boot-mode (legacy) | Full-Disk Encryption (FDE)
13743 | VeraCrypt RIPEMD160 + XTS 1536 bit + boot-mode (legacy) | Full-Disk Encryption (FDE)
29411 | VeraCrypt RIPEMD160 + XTS 512 bit | Full-Disk Encryption (FDE)
29412 | VeraCrypt RIPEMD160 + XTS 1024 bit | Full-Disk Encryption (FDE)
29413 | VeraCrypt RIPEMD160 + XTS 1536 bit | Full-Disk Encryption (FDE)
29441 | VeraCrypt RIPEMD160 + XTS 512 bit + boot-mode | Full-Disk Encryption (FDE)
29442 | VeraCrypt RIPEMD160 + XTS 1024 bit + boot-mode | Full-Disk Encryption (FDE)
29443 | VeraCrypt RIPEMD160 + XTS 1536 bit + boot-mode | Full-Disk Encryption (FDE)
13751 | VeraCrypt SHA256 + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)
13752 | VeraCrypt SHA256 + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)
13753 | VeraCrypt SHA256 + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)
13761 | VeraCrypt SHA256 + XTS 512 bit + boot-mode (legacy) | Full-Disk Encryption (FDE)
13762 | VeraCrypt SHA256 + XTS 1024 bit + boot-mode (legacy) | Full-Disk Encryption (FDE)
13763 | VeraCrypt SHA256 + XTS 1536 bit + boot-mode (legacy) | Full-Disk Encryption (FDE)
29451 | VeraCrypt SHA256 + XTS 512 bit | Full-Disk Encryption (FDE)
29452 | VeraCrypt SHA256 + XTS 1024 bit | Full-Disk Encryption (FDE)
29453 | VeraCrypt SHA256 + XTS 1536 bit | Full-Disk Encryption (FDE)
29461 | VeraCrypt SHA256 + XTS 512 bit + boot-mode | Full-Disk Encryption (FDE)
29462 | VeraCrypt SHA256 + XTS 1024 bit + boot-mode | Full-Disk Encryption (FDE)
29463 | VeraCrypt SHA256 + XTS 1536 bit + boot-mode | Full-Disk Encryption (FDE)
13721 | VeraCrypt SHA512 + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)
13722 | VeraCrypt SHA512 + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)
13723 | VeraCrypt SHA512 + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)
29421 | VeraCrypt SHA512 + XTS 512 bit | Full-Disk Encryption (FDE)
29422 | VeraCrypt SHA512 + XTS 1024 bit | Full-Disk Encryption (FDE)
29423 | VeraCrypt SHA512 + XTS 1536 bit | Full-Disk Encryption (FDE)
13771 | VeraCrypt Streebog-512 + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)
13772 | VeraCrypt Streebog-512 + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)
13773 | VeraCrypt Streebog-512 + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)
13781 | VeraCrypt Streebog-512 + XTS 512 bit + boot-mode (legacy) | Full-Disk Encryption (FDE)
13782 | VeraCrypt Streebog-512 + XTS 1024 bit + boot-mode (legacy) | Full-Disk Encryption (FDE)
13783 | VeraCrypt Streebog-512 + XTS 1536 bit + boot-mode (legacy) | Full-Disk Encryption (FDE)
29471 | VeraCrypt Streebog-512 + XTS 512 bit | Full-Disk Encryption (FDE)
29472 | VeraCrypt Streebog-512 + XTS 1024 bit | Full-Disk Encryption (FDE)
29473 | VeraCrypt Streebog-512 + XTS 1536 bit | Full-Disk Encryption (FDE)
29481 | VeraCrypt Streebog-512 + XTS 512 bit + boot-mode | Full-Disk Encryption (FDE)
29482 | VeraCrypt Streebog-512 + XTS 1024 bit + boot-mode | Full-Disk Encryption (FDE)
29483 | VeraCrypt Streebog-512 + XTS 1536 bit + boot-mode | Full-Disk Encryption (FDE)
13731 | VeraCrypt Whirlpool + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)
13732 | VeraCrypt Whirlpool + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)
13733 | VeraCrypt Whirlpool + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)
29431 | VeraCrypt Whirlpool + XTS 512 bit | Full-Disk Encryption (FDE)
29432 | VeraCrypt Whirlpool + XTS 1024 bit | Full-Disk Encryption (FDE)
29433 | VeraCrypt Whirlpool + XTS 1536 bit | Full-Disk Encryption (FDE)
23900 | BestCrypt v3 Volume Encryption | Full-Disk Encryption (FDE)
16700 | FileVault 2 | Full-Disk Encryption (FDE)
27500 | VirtualBox (PBKDF2-HMAC-SHA256 & AES-128-XTS) | Full-Disk Encryption (FDE)
27600 | VirtualBox (PBKDF2-HMAC-SHA256 & AES-256-XTS) | Full-Disk Encryption (FDE)
20011 | DiskCryptor SHA512 + XTS 512 bit | Full-Disk Encryption (FDE)
20012 | DiskCryptor SHA512 + XTS 1024 bit | Full-Disk Encryption (FDE)
20013 | DiskCryptor SHA512 + XTS 1536 bit | Full-Disk Encryption (FDE)
22100 | BitLocker | Full-Disk Encryption (FDE)
12900 | Android FDE (Samsung DEK) | Full-Disk Encryption (FDE)
8800 | Android FDE <= 4.3 | Full-Disk Encryption (FDE)
18300 | Apple File System (APFS) | Full-Disk Encryption (FDE)
6211 | TrueCrypt RIPEMD160 + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)
6212 | TrueCrypt RIPEMD160 + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)
6213 | TrueCrypt RIPEMD160 + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)
6241 | TrueCrypt RIPEMD160 + XTS 512 bit + boot-mode (legacy) | Full-Disk Encryption (FDE)
6242 | TrueCrypt RIPEMD160 + XTS 1024 bit + boot-mode (legacy) | Full-Disk Encryption (FDE)
6243 | TrueCrypt RIPEMD160 + XTS 1536 bit + boot-mode (legacy) | Full-Disk Encryption (FDE)
29311 | TrueCrypt RIPEMD160 + XTS 512 bit | Full-Disk Encryption (FDE)
29312 | TrueCrypt RIPEMD160 + XTS 1024 bit | Full-Disk Encryption (FDE)
29313 | TrueCrypt RIPEMD160 + XTS 1536 bit | Full-Disk Encryption (FDE)
29341 | TrueCrypt RIPEMD160 + XTS 512 bit + boot-mode | Full-Disk Encryption (FDE)
29342 | TrueCrypt RIPEMD160 + XTS 1024 bit + boot-mode | Full-Disk Encryption (FDE)
29343 | TrueCrypt RIPEMD160 + XTS 1536 bit + boot-mode | Full-Disk Encryption (FDE)
6221 | TrueCrypt SHA512 + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)
6222 | TrueCrypt SHA512 + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)
6223 | TrueCrypt SHA512 + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)
29321 | TrueCrypt SHA512 + XTS 512 bit | Full-Disk Encryption (FDE)
29322 | TrueCrypt SHA512 + XTS 1024 bit | Full-Disk Encryption (FDE)
29323 | TrueCrypt SHA512 + XTS 1536 bit | Full-Disk Encryption (FDE)
6231 | TrueCrypt Whirlpool + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)
6232 | TrueCrypt Whirlpool + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)
6233 | TrueCrypt Whirlpool + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)
29331 | TrueCrypt Whirlpool + XTS 512 bit | Full-Disk Encryption (FDE)
29332 | TrueCrypt Whirlpool + XTS 1024 bit | Full-Disk Encryption (FDE)
29333 | TrueCrypt Whirlpool + XTS 1536 bit | Full-Disk Encryption (FDE)
12200 | eCryptfs | Full-Disk Encryption (FDE)
10400 | PDF 1.1 - 1.3 (Acrobat 2 - 4) | Document
10410 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #1 | Document
10420 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #2 | Document
10500 | PDF 1.4 - 1.6 (Acrobat 5 - 8) | Document
25400 | PDF 1.4 - 1.6 (Acrobat 5 - 8) - user and owner pass | Document
10600 | PDF 1.7 Level 3 (Acrobat 9) | Document
10700 | PDF 1.7 Level 8 (Acrobat 10 - 11) | Document
9400 | MS Office 2007 | Document
9500 | MS Office 2010 | Document
9600 | MS Office 2013 | Document
25300 | MS Office 2016 - SheetProtection | Document
9700 | MS Office <= 2003 $0/$1, MD5 + RC4 | Document
9710 | MS Office <= 2003 $0/$1, MD5 + RC4, collider #1 | Document
9720 | MS Office <= 2003 $0/$1, MD5 + RC4, collider #2 | Document
9810 | MS Office <= 2003 $3, SHA1 + RC4, collider #1 | Document
9820 | MS Office <= 2003 $3, SHA1 + RC4, collider #2 | Document
9800 | MS Office <= 2003 $3/$4, SHA1 + RC4 | Document
18400 | Open Document Format (ODF) 1.2 (SHA-256, AES) | Document
18600 | Open Document Format (ODF) 1.1 (SHA-1, Blowfish) | Document
16200 | Apple Secure Notes | Document
23300 | Apple iWork | Document
6600 | 1Password, agilekeychain | Password Manager
8200 | 1Password, cloudkeychain | Password Manager
9000 | Password Safe v2 | Password Manager
5200 | Password Safe v3 | Password Manager
6800 | LastPass + LastPass sniffed | Password Manager
13400 | KeePass 1 (AES/Twofish) and KeePass 2 (AES) | Password Manager
29700 | KeePass 1 (AES/Twofish) and KeePass 2 (AES) - keyfile only mode | Password Manager
23400 | Bitwarden | Password Manager
16900 | Ansible Vault | Password Manager
26000 | Mozilla key3.db | Password Manager
26100 | Mozilla key4.db | Password Manager
23100 | Apple Keychain | Password Manager
11600 | 7-Zip | Archive
12500 | RAR3-hp | Archive
23800 | RAR3-p (Compressed) | Archive
23700 | RAR3-p (Uncompressed) | Archive
13000 | RAR5 | Archive
17220 | PKZIP (Compressed Multi-File) | Archive
17200 | PKZIP (Compressed) | Archive
17225 | PKZIP (Mixed Multi-File) | Archive
17230 | PKZIP (Mixed Multi-File Checksum-Only) | Archive
17210 | PKZIP (Uncompressed) | Archive
20500 | PKZIP Master Key | Archive
20510 | PKZIP Master Key (6 byte optimization) | Archive
23001 | SecureZIP AES-128 | Archive
23002 | SecureZIP AES-192 | Archive
23003 | SecureZIP AES-256 | Archive
13600 | WinZip | Archive
18900 | Android Backup | Archive
24700 | Stuffit5 | Archive
13200 | AxCrypt 1 | Archive
13300 | AxCrypt 1 in-memory SHA1 | Archive
23500 | AxCrypt 2 AES-128 | Archive
23600 | AxCrypt 2 AES-256 | Archive
14700 | iTunes backup < 10.0 | Archive
14800 | iTunes backup >= 10.0 | Archive
8400 | WBB3 (Woltlab Burning Board) | Forums, CMS, E-Commerce
2612 | PHPS | Forums, CMS, E-Commerce
121 | SMF (Simple Machines Forum) > v1.1 | Forums, CMS, E-Commerce
3711 | MediaWiki B type | Forums, CMS, E-Commerce
4521 | Redmine | Forums, CMS, E-Commerce
24800 | Umbraco HMAC-SHA1 | Forums, CMS, E-Commerce
11 | Joomla < 2.5.18 | Forums, CMS, E-Commerce
13900 | OpenCart | Forums, CMS, E-Commerce
11000 | PrestaShop | Forums, CMS, E-Commerce
16000 | Tripcode | Forums, CMS, E-Commerce
7900 | Drupal7 | Forums, CMS, E-Commerce
4522 | PunBB | Forums, CMS, E-Commerce
2811 | MyBB 1.2+, IPB2+ (Invision Power Board) | Forums, CMS, E-Commerce
2611 | vBulletin < v3.8.5 | Forums, CMS, E-Commerce
2711 | vBulletin >= v3.8.5 | Forums, CMS, E-Commerce
25600 | bcrypt(md5($pass)) / bcryptmd5 | Forums, CMS, E-Commerce
25800 | bcrypt(sha1($pass)) / bcryptsha1 | Forums, CMS, E-Commerce
28400 | bcrypt(sha512($pass)) / bcryptsha512 | Forums, CMS, E-Commerce
21 | osCommerce, xt:Commerce | Forums, CMS, E-Commerce
18100 | TOTP (HMAC-SHA1) | One-Time Password
2000 | STDOUT | Plaintext
99999 | Plaintext | Plaintext
21600 | Web2py pbkdf2-sha512 | Framework
10000 | Django (PBKDF2-SHA256) | Framework
124 | Django (SHA-1) | Framework
12001 | Atlassian (PBKDF2-HMAC-SHA1) | Framework
19500 | Ruby on Rails Restful-Authentication | Framework
27200 | Ruby on Rails Restful Auth (one round, no sitekey) | Framework
30000 | Python Werkzeug MD5 (HMAC-MD5 (key = $salt)) | Framework
30120 | Python Werkzeug SHA256 (HMAC-SHA256 (key = $salt)) | Framework
20200 | Python passlib pbkdf2-sha512 | Framework
20300 | Python passlib pbkdf2-sha256 | Framework
20400 | Python passlib pbkdf2-sha1 | Framework
24410 | PKCS#8 Private Keys (PBKDF2-HMAC-SHA1 + 3DES/AES) | Private Key
24420 | PKCS#8 Private Keys (PBKDF2-HMAC-SHA256 + 3DES/AES) | Private Key
15500 | JKS Java Key Store Private Keys (SHA1) | Private Key
22911 | RSA/DSA/EC/OpenSSH Private Keys ($0$) | Private Key
22921 | RSA/DSA/EC/OpenSSH Private Keys ($6$) | Private Key
22931 | RSA/DSA/EC/OpenSSH Private Keys ($1, $3$) | Private Key
22941 | RSA/DSA/EC/OpenSSH Private Keys ($4$) | Private Key
22951 | RSA/DSA/EC/OpenSSH Private Keys ($5$) | Private Key
23200 | XMPP SCRAM PBKDF2-SHA1 | Instant Messaging Service
28300 | Teamspeak 3 (channel hash) | Instant Messaging Service
22600 | Telegram Desktop < v2.1.14 (PBKDF2-HMAC-SHA1) | Instant Messaging Service
24500 | Telegram Desktop >= v2.1.14 (PBKDF2-HMAC-SHA512) | Instant Messaging Service
22301 | Telegram Mobile App Passcode (SHA256) | Instant Messaging Service
23 | Skype | Instant Messaging Service
29600 | Terra Station Wallet (AES256-CBC(PBKDF2($pass))) | Cryptocurrency Wallet
26600 | MetaMask Wallet | Cryptocurrency Wallet
21000 | BitShares v0.x - sha512(sha512_bin(pass)) | Cryptocurrency Wallet
28501 | Bitcoin WIF private key (P2PKH), compressed | Cryptocurrency Wallet
28502 | Bitcoin WIF private key (P2PKH), uncompressed | Cryptocurrency Wallet
28503 | Bitcoin WIF private key (P2WPKH, Bech32), compressed | Cryptocurrency Wallet
28504 | Bitcoin WIF private key (P2WPKH, Bech32), uncompressed | Cryptocurrency Wallet
28505 | Bitcoin WIF private key (P2SH(P2WPKH)), compressed | Cryptocurrency Wallet
28506 | Bitcoin WIF private key (P2SH(P2WPKH)), uncompressed | Cryptocurrency Wallet
11300 | Bitcoin/Litecoin wallet.dat | Cryptocurrency Wallet
16600 | Electrum Wallet (Salt-Type 1-3) | Cryptocurrency Wallet
21700 | Electrum Wallet (Salt-Type 4) | Cryptocurrency Wallet
21800 | Electrum Wallet (Salt-Type 5) | Cryptocurrency Wallet
12700 | Blockchain, My Wallet | Cryptocurrency Wallet
15200 | Blockchain, My Wallet, V2 | Cryptocurrency Wallet
18800 | Blockchain, My Wallet, Second Password (SHA256) | Cryptocurrency Wallet
25500 | Stargazer Stellar Wallet XLM | Cryptocurrency Wallet
16300 | Ethereum Pre-Sale Wallet, PBKDF2-HMAC-SHA256 | Cryptocurrency Wallet
15600 | Ethereum Wallet, PBKDF2-HMAC-SHA256 | Cryptocurrency Wallet
15700 | Ethereum Wallet, SCRYPT | Cryptocurrency Wallet
22500 | MultiBit Classic .key (MD5) | Cryptocurrency Wallet
27700 | MultiBit Classic .wallet (scrypt) | Cryptocurrency Wallet
22700 | MultiBit HD (scrypt) | Cryptocurrency Wallet
28200 | Exodus Desktop Wallet (scrypt) | Cryptocurrency Wallet
- [ Brain Client Features ] -
# | Features
===+========
1 | Send hashed passwords
2 | Send attack positions
3 | Send hashed passwords and attack positions
- [ Outfile Formats ] -
# | Format
===+========
1 | hash[:salt]
2 | plain
3 | hex_plain
4 | crack_pos
5 | timestamp absolute
6 | timestamp relative
- [ Rule Debugging Modes ] -
# | Format
===+========
1 | Finding-Rule
2 | Original-Word
3 | Original-Word:Finding-Rule
4 | Original-Word:Finding-Rule:Processed-Word
5 | Original-Word:Finding-Rule:Processed-Word:Wordlist
- [ Attack Modes ] -
# | Mode
===+======
0 | Straight
1 | Combination
3 | Brute-force
6 | Hybrid Wordlist + Mask
7 | Hybrid Mask + Wordlist
9 | Association
- [ Built-in Charsets ] -
? | Charset
===+=========
l | abcdefghijklmnopqrstuvwxyz [a-z]
u | ABCDEFGHIJKLMNOPQRSTUVWXYZ [A-Z]
d | 0123456789 [0-9]
h | 0123456789abcdef [0-9a-f]
H | 0123456789ABCDEF [0-9A-F]
s | !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~
a | ?l?u?d?s
b | 0x00 - 0xff
- [ OpenCL Device Types ] -
# | Device Type
===+=============
1 | CPU
2 | GPU
3 | FPGA, DSP, Co-Processor
- [ Workload Profiles ] -
# | Performance | Runtime | Power Consumption | Desktop Impact
===+=============+=========+===================+=================
1 | Low | 2 ms | Low | Minimal
2 | Default | 12 ms | Economic | Noticeable
3 | High | 96 ms | High | Unresponsive
4 | Nightmare | 480 ms | Insane | Headless
- [ License ] -
hashcat is licensed under the MIT license
Copyright and license terms are listed in docs/license.txt
- [ Basic Examples ] -
Attack- | Hash- |
Mode | Type | Example command
==================+=======+==================================================================
Wordlist | $P$ | hashcat -a 0 -m 400 example400.hash example.dict
Wordlist + Rules | MD5 | hashcat -a 0 -m 0 example0.hash example.dict -r rules/best64.rule
Brute-Force | MD5 | hashcat -a 3 -m 0 example0.hash ?a?a?a?a?a?a
Combinator | MD5 | hashcat -a 1 -m 0 example0.hash example.dict example.dict
Association | $1$ | hashcat -a 9 -m 500 example500.hash 1word.dict -r rules/best64.rule
If you still have no idea what just happened, try the following pages:
* https://hashcat.net/wiki/#howtos_videos_papers_articles_etc_in_the_wild
* https://hashcat.net/faq/
If you think you need help by a real human come to the hashcat Discord:
* https://hashcat.net/discord
Módy útoku
Hashcat lze použít pro několik typů útoků:
- Slovník (-a 0) – Načte hodnotu z textového souboru a každý řádek použije jako kandidáta na heslo.
- Kombinace (-a 1) – Stejně jako slovníkový útok s tím rozdílem, že používá dva slovníky. Každé slovo slovníku je připojeno ke každému slovu druhého slovníku.
- Bruteforce a Maska (-a 3) – Vyzkouší všechny kombinace v daném prostoru. Jedná se o efektivní hrubou sílu v uživatelsky zadaných sadách znaků.
- Hybridní (-a 6 a -a 7) – Kombinace slovníkového útoku a útoku maskou.
Příklady útoku
Slovníkový útok
Zobrazení dostupných slovníků
wordlists -h
> wordlists ~ Contains the rockyou wordlist
/usr/share/wordlists
├── amass -> /usr/share/amass/wordlists
├── dirb -> /usr/share/dirb/wordlists
├── dirbuster -> /usr/share/dirbuster/wordlists
├── dnsmap.txt -> /usr/share/dnsmap/wordlist_TLAs.txt
├── fasttrack.txt -> /usr/share/set/src/fasttrack/wordlist.txt
├── fern-wifi -> /usr/share/fern-wifi-cracker/extras/wordlists
├── john.lst -> /usr/share/john/password.lst
├── legion -> /usr/share/legion/wordlists
├── metasploit -> /usr/share/metasploit-framework/data/wordlists
├── nmap.lst -> /usr/share/nmap/nselib/data/passwords.lst
├── rockyou.txt
├── rockyou.txt.gz
├── sqlmap.txt -> /usr/share/sqlmap/data/txt/wordlist.txt
├── wfuzz -> /usr/share/wfuzz/wordlist
└── wifite.txt -> /usr/share/dict/wordlist-probable.txt
Příklad 1: MD5
Pro slovníkový útok jsme zvolili jednoduchá hesla, které jsme převedli na hashe přes MD5 online generátor. Tyto hashe jsme uložili do souboru hesla_md5.txt, ukázka viz níže.
42f749ade7f9e195bf475f37a44cafcb
21232f297a57a5a743894a0e4a801fc3
c8205c7636e728d448c2774e6a4a944b
Parametry:
- -a, určuje typ/mód útoku
- -m určuje hash, který byl použit. V našem případě 0 pro MD5.
- -o specifikuje kde se má uložit výstup
- -O výrazně zvýší rychlost prolamování, ale omezí délku hesla na 27 znaků
Následně jsme spustili tento příkaz:
hashcat -m 0 -a 0 -o vystup_md5_desifrovani.txt hesla_md5.txt /usr/share/wordlists/rockyou.txt -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-penryn-Intel(R) Pentium(R) CPU G620 @ 2.60GHz, 1536/3137 MB (512 MB allocatable), 2MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Meet-In-The-Middle
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Dictionary cache built:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344392
* Bytes.....: 139921507
* Keyspace..: 14344385
* Runtime...: 3 secs
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 0 (MD5)
Hash.Target......: hesla_md5.txt
Time.Started.....: Fri Apr 12 19:41:22 2024 (0 secs)
Time.Estimated...: Fri Apr 12 19:41:22 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 261.2 kH/s (0.14ms) @ Accel:256 Loops:1 Thr:1 Vec:4
Recovered........: 3/3 (100.00%) Digests (total), 3/3 (100.00%) Digests (new)
Progress.........: 41473/14344385 (0.29%)
Rejected.........: 1/41473 (0.00%)
Restore.Point....: 40961/14344385 (0.29%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: loool -> 180893
Hardware.Mon.#1..: Util: 51%
Started: Fri Apr 12 19:40:44 2024
Stopped: Fri Apr 12 19:41:23 2024
Výsledný soubor s prolomenými hašy:
21232f297a57a5a743894a0e4a801fc3:admin
42f749ade7f9e195bf475f37a44cafcb:Password123
c8205c7636e728d448c2774e6a4a944b:Internet
Příklad 2: SHA-1
Stejné hesla, ale s zaheshované pomocí SHA-1:
d033e22ae348aeb5660fc2140aec35850c4da997
b2e98ad6f6eb8508dd6a14cfa704bad7f05f6fb1
66c06c11d179e39c42e5e800f99b57865822cf68
Příkaz pro hashcat, nyní s parametrem -m 100 (SHA-1):
hashcat -m 100 -a 0 -o vystup_sha1_desifrovani.txt sha1_hesla.txt /usr/share/wordlists/rockyou.txt -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-penryn-Intel(R) Pentium(R) CPU G620 @ 2.60GHz, 1536/3137 MB (512 MB allocatable), 2MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 100 (SHA1)
Hash.Target......: sha1_hesla.txt
Time.Started.....: Fri Apr 12 20:15:46 2024 (0 secs)
Time.Estimated...: Fri Apr 12 20:15:46 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 617.1 kH/s (0.21ms) @ Accel:256 Loops:1 Thr:1 Vec:4
Recovered........: 3/3 (100.00%) Digests (total), 3/3 (100.00%) Digests (new)
Progress.........: 41473/14344385 (0.29%)
Rejected.........: 1/41473 (0.00%)
Restore.Point....: 40961/14344385 (0.29%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: loool -> 180893
Hardware.Mon.#1..: Util: 43%
Started: Fri Apr 12 20:15:10 2024
Stopped: Fri Apr 12 20:15:47 2024
Výsledný soubor s prolomenými hašy:
d033e22ae348aeb5660fc2140aec35850c4da997:admin
b2e98ad6f6eb8508dd6a14cfa704bad7f05f6fb1:Password123
66c06c11d179e39c42e5e800f99b57865822cf68:Internet
Příklad 3: SHA2-256
Stejné hesla, ale s zahešované pomocí SHA2-256:
8c6976e5b5410415bde908bd4dee15dfb167a9c873fc4bb8a81f6f2ab448a918
008c70392e3abfbd0fa47bbc2ed96aa99bd49e159727fcba0f2e6abeb3a9d601
57e8a431deec0d70da0a26ea3392e59688b11b79edfd04e9da823b16bcd1d4d7
Příkaz pro Hashcat, nyní s parametrem -m 1400 (SHA2-256):
hashcat -m 1400 -a 0 -o vystup_sha256_desifrovani.txt hesla_sha256.txt /usr/share/wordlists/rockyou.txt -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-penryn-Intel(R) Pentium(R) CPU G620 @ 2.60GHz, 1536/3137 MB (512 MB allocatable), 2MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 1400 (SHA2-256)
Hash.Target......: hesla_sha256.tx
Time.Started.....: Thu Apr 25 11:13:48 2024 (0 secs)
Time.Estimated...: Thu Apr 25 11:13:48 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 436.5 kH/s (0.47ms) @ Accel:256 Loops:1 Thr:1 Vec:4
Recovered........: 3/3 (100.00%) Digests (total), 3/3 (100.00%) Digests (new)
Progress.........: 41473/14344385 (0.29%)
Rejected.........: 1/41473 (0.00%)
Restore.Point....: 40961/14344385 (0.29%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: loool -> 180893
Hardware.Mon.#1..: Util: 50%
Started: Thu Apr 25 11:13:05 2024
Stopped: Thu Apr 25 11:13:50 2024
Výsledný soubor s prolomenými hašy:
8c6976e5b5410415bde908bd4dee15dfb167a9c873fc4bb8a81f6f2ab448a918:admin
008c70392e3abfbd0fa47bbc2ed96aa99bd49e159727fcba0f2e6abeb3a9d601:Password123
57e8a431deec0d70da0a26ea3392e59688b11b79edfd04e9da823b16bcd1d4d7:Internet
Příklad 4: BLAKE2b – 512
Stejné hesla, ale s zahešované pomocí BLAKE2b – 512. Pro tento typ hashe je u Hashcatu potřeba přidat předznamení $BLAKE2$. Bez tohoto totiž Hashcat nedokáže Blake2 identifikovat a hlásí chybu.
$BLAKE2$bfcce2c19c8563fd4aa66f6ec607341ff25e5f6fe7fa520d7d1242d871385f23a3e8e80093120b4877d79535e10b182ae2ec8937d1f72f091e7178c9e4ff0f11
$BLAKE2$41efa2ee765dac718e8122c20caa1d5a8157bbdbcd1445d7273e5d0be9e79e16f6e8c127ab384d83c8fc70233138b0ccc59469c1e2ef3704f46740ee688a7396
$BLAKE2$9e27d871fa2561e2dc0e07dca66cf00ea597894e39db627ba611ca480b9edcdc4e15c8226a7ecf08c8c54953f6c45c68a5745b9724350228727fcb518531ef46
Příkaz pro Hashcat, nyní s parametrem -m 600 (BLAKE2b – 512):
hashcat -m 600 -a 0 -o vystup_blake2b_desifrovani.txt hesla_blake2b.txt /usr/share/wordlists/rockyou.txt -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-penryn-Intel(R) Pentium(R) CPU G620 @ 2.60GHz, 1536/3137 MB (512 MB allocatable), 2MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 1
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Not-Iterated
* Single-Salt
* Raw-Hash
* Uses-64-Bit
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 600 (BLAKE2b-512)
Hash.Target......: hesla_blake2b.txt
Time.Started.....: Tue Apr 30 20:47:24 2024 (0 secs)
Time.Estimated...: Tue Apr 30 20:47:25 2024 (1 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 848.5 kH/s (0.34ms) @ Accel:256 Loops:1 Thr:1 Vec:2
Recovered........: 3/3 (100.00%) Digests (total), 3/3 (100.00%) Digests (new)
Progress.........: 41473/14344385 (0.29%)
Rejected.........: 1/41473 (0.00%)
Restore.Point....: 40961/14344385 (0.29%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Device Generator
Candidates.#1....: loool -> 180893
Hardware.Mon.#1..: Util: 47%
Started: Tue Apr 30 20:47:22 2024
Stopped: Tue Apr 30 20:47:26 2024
Výsledný soubor s prolomenými hašy:
$BLAKE2$bfcce2c19c8563fd4aa66f6ec607341ff25e5f6fe7fa520d7d1242d871385f23a3e8e80093120b4877d79535e10b182ae2ec8937d1f72f091e7178c9e4ff0f11:admin
$BLAKE2$41efa2ee765dac718e8122c20caa1d5a8157bbdbcd1445d7273e5d0be9e79e16f6e8c127ab384d83c8fc70233138b0ccc59469c1e2ef3704f46740ee688a7396:Password123
$BLAKE2$9e27d871fa2561e2dc0e07dca66cf00ea597894e39db627ba611ca480b9edcdc4e15c8226a7ecf08c8c54953f6c45c68a5745b9724350228727fcb518531ef46:Internet
Srovnání rychlostí prolomení
Slovníkový útok s pravidly
Zobrazení seznamu dostupných pravidel
┌──(kali㉿kali)-[/usr/share/hashcat/rules]
└─$ ls -l
total 2852
-rw-r--r-- 1 root root 933 Oct 6 2022 best64.rule
-rw-r--r-- 1 root root 754 Oct 6 2022 combinator.rule
-rw-r--r-- 1 root root 200739 Oct 6 2022 d3ad0ne.rule
-rw-r--r-- 1 root root 788063 Oct 6 2022 dive.rule
-rw-r--r-- 1 root root 483425 Oct 6 2022 generated2.rule
-rw-r--r-- 1 root root 78068 Oct 6 2022 generated.rule
drwxr-xr-x 2 root root 4096 Feb 25 16:46 hybrid
-rw-r--r-- 1 root root 309439 Oct 6 2022 Incisive-leetspeak.rule
-rw-r--r-- 1 root root 35802 Oct 6 2022 InsidePro-HashManager.rule
-rw-r--r-- 1 root root 20580 Oct 6 2022 InsidePro-PasswordsPro.rule
-rw-r--r-- 1 root root 298 Oct 6 2022 leetspeak.rule
-rw-r--r-- 1 root root 1280 Oct 6 2022 oscommerce.rule
-rw-r--r-- 1 root root 301161 Oct 6 2022 rockyou-30000.rule
-rw-r--r-- 1 root root 1563 Oct 6 2022 specific.rule
-rw-r--r-- 1 root root 1289 Oct 6 2022 T0XlC_3_rule.rule
-rw-r--r-- 1 root root 64068 Oct 6 2022 T0XlC-insert_00-99_1950-2050_toprules_0_F.rule
-rw-r--r-- 1 root root 168700 Oct 6 2022 T0XlC_insert_HTML_entities_0_Z.rule
-rw-r--r-- 1 root root 2027 Oct 6 2022 T0XlC-insert_space_and_special_0_F.rule
-rw-r--r-- 1 root root 34437 Oct 6 2022 T0XlC-insert_top_100_passwords_1_G.rule
-rw-r--r-- 1 root root 34813 Oct 6 2022 T0XlC.rule
-rw-r--r-- 1 root root 197418 Oct 6 2022 T0XlCv2.rule
-rw-r--r-- 1 root root 45 Oct 6 2022 toggles1.rule
-rw-r--r-- 1 root root 570 Oct 6 2022 toggles2.rule
-rw-r--r-- 1 root root 3755 Oct 6 2022 toggles3.rule
-rw-r--r-- 1 root root 16040 Oct 6 2022 toggles4.rule
-rw-r--r-- 1 root root 49073 Oct 6 2022 toggles5.rule
-rw-r--r-- 1 root root 55346 Oct 6 2022 unix-ninja-leetspeak.rule
Seznam vstupních hašů:
Příklad 1: MD5 s pravidly best64
db69efb2fe9de7ae3268d7ee520f28d0
47a21a434edabe1abea6e6ec4d2f20cb
00793e65eb29ec261f525ee086ee693a
bb961d424fe90b99303c83d819014f01
Příkaz pro slovníkový útoku s pravidlem best64:
hashcat -m 0 -a 0 -o vystup_md5_desifrovani_slovnik_pravidla.txt hesla_md5_slovnik.txt /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-penryn-Intel(R) Pentium(R) CPU G620 @ 2.60GHz, 1536/3137 MB (512 MB allocatable), 2MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 4 digests; 4 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 77
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Meet-In-The-Middle
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 1104517645
Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 0 (MD5)
Hash.Target......: hesla_md5_slovnik.txt
Time.Started.....: Thu Apr 25 13:54:58 2024 (1 min, 39 secs)
Time.Estimated...: Thu Apr 25 13:56:37 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Mod........: Rules (/usr/share/hashcat/rules/best64.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 11148.2 kH/s (3.14ms) @ Accel:256 Loops:77 Thr:1 Vec:4
Recovered........: 3/4 (75.00%) Digests (total), 3/4 (75.00%) Digests (new)
Progress.........: 1104517645/1104517645 (100.00%)
Rejected.........: 238238/1104517645 (0.02%)
Restore.Point....: 14344385/14344385 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-77 Iteration:0-77
Candidate.Engine.: Device Generator
Candidates.#1....: $HEX[20687071313233] -> $HEX[04a156616d6f]
Hardware.Mon.#1..: Util: 94%
Started: Thu Apr 25 13:54:56 2024
Stopped: Thu Apr 25 13:56:39 2024
Výsledný soubor s prolomenými hashy:
47a21a434edabe1abea6e6ec4d2f20cb:mojeheslo
00793e65eb29ec261f525ee086ee693a:tajneheslo
bb961d424fe90b99303c83d819014f01:PassWord1234
Ve výsledném souboru jsou 3 prolomená hesla ze 4. Chybí zde první hašh, který obsahoval heslo: !nterNet
Příklad 2: SHA-1 s pravidly best64
5e358da5261ab5d984ab0c914f86861a8f1bcc9c
66d30c93619758b4fd14eb88a7c7b9ff1d4c4b6e
56ac2821246eb2d132df130db19aa9da25850fd3
50a8371455bbc2aeed297b411edd9ea6411b6188
Příkaz pro slovníkový útoku s pravidlem best64:
hashcat -m 100 -a 0 -o vystup_sha1_desifrovani_pravidla_slovnik.txt hesla_sha1_slovnik_pravidla.txt /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-penryn-Intel(R) Pentium(R) CPU G620 @ 2.60GHz, 1536/3137 MB (512 MB allocatable), 2MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 4 digests; 4 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 77
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 1104517645
Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 100 (SHA1)
Hash.Target......: hesla_sha1_slovnik_pravidla.txt
Time.Started.....: Thu Apr 25 14:48:08 2024 (1 min, 44 secs)
Time.Estimated...: Thu Apr 25 14:49:52 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Mod........: Rules (/usr/share/hashcat/rules/best64.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 10556.3 kH/s (3.45ms) @ Accel:256 Loops:77 Thr:1 Vec:4
Recovered........: 3/4 (75.00%) Digests (total), 3/4 (75.00%) Digests (new)
Progress.........: 1104517645/1104517645 (100.00%)
Rejected.........: 238238/1104517645 (0.02%)
Restore.Point....: 14344385/14344385 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-77 Iteration:0-77
Candidate.Engine.: Device Generator
Candidates.#1....: $HEX[20687071313233] -> $HEX[04a156616d6f]
Hardware.Mon.#1..: Util: 95%
Started: Thu Apr 25 14:48:07 2024
Stopped: Thu Apr 25 14:49:53 2024
Výsledný soubor s prolomenými hashy:
66d30c93619758b4fd14eb88a7c7b9ff1d4c4b6e:mojeheslo
56ac2821246eb2d132df130db19aa9da25850fd3:tajneheslo
50a8371455bbc2aeed297b411edd9ea6411b6188:PassWord1234
Ve výsledném souboru jsou 3 prolomená hesla ze 4. Chybí zde první hašh, který obsahoval heslo: !nterNet
Příklad 3: SHA-256 s pravidly best64
597868cff006a3faeb434cb9f9fd76f268254802a342804d72fb26ad63077962
3d472d1b85f55b8fbaa0bb9bddf9e91dd070ca23a8db6cac0c58be0a7a9521b6
7e2677c4c788b2ca0c378c4824dd4928e5fcdd43b504050e2eaec22984762c78
8c9d4263460a78452eaab5a90f938c71d1c38700d7de2d0325fdd1daa08e9d23
Příkaz pro slovníkový útoku s pravidlem best64:
hashcat -m 1400 -a 0 -o vystup_sha256_desifrovani_pravidla_slovnik.txt hesla_sha256_slovnik_pravidla.txt /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-penryn-Intel(R) Pentium(R) CPU G620 @ 2.60GHz, 1536/3137 MB (512 MB allocatable), 2MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 4 digests; 4 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 77
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 1104517645
Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 1400 (SHA2-256)
Hash.Target......: hesla_sha256_slovnik_pravidla.txt
Time.Started.....: Thu Apr 25 14:58:24 2024 (2 mins, 49 secs)
Time.Estimated...: Thu Apr 25 15:01:13 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Mod........: Rules (/usr/share/hashcat/rules/best64.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 6546.3 kH/s (5.60ms) @ Accel:256 Loops:77 Thr:1 Vec:4
Recovered........: 3/4 (75.00%) Digests (total), 3/4 (75.00%) Digests (new)
Progress.........: 1104517645/1104517645 (100.00%)
Rejected.........: 238238/1104517645 (0.02%)
Restore.Point....: 14344385/14344385 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-77 Iteration:0-77
Candidate.Engine.: Device Generator
Candidates.#1....: $HEX[20687071313233] -> $HEX[04a156616d6f]
Hardware.Mon.#1..: Util: 98%
Started: Thu Apr 25 14:58:23 2024
Stopped: Thu Apr 25 15:01:15 2024
Výsledný soubor s prolomenými hashy:
3d472d1b85f55b8fbaa0bb9bddf9e91dd070ca23a8db6cac0c58be0a7a9521b6:mojeheslo
7e2677c4c788b2ca0c378c4824dd4928e5fcdd43b504050e2eaec22984762c78:tajneheslo
8c9d4263460a78452eaab5a90f938c71d1c38700d7de2d0325fdd1daa08e9d23:PassWord12
Ve výsledném souboru jsou 3 prolomená hesla ze 4. Chybí zde první hašh, který obsahoval heslo: !nterNet
Příklad 4: BLAKE2b – 512 s pravidly best64
$BLAKE2$6e76262972afcd43205cfeb1cbca28f35d7764f6f9786937aacc26726a0ec1ff26965798d4a54f315d2eb0a01df77c1092c82f16df21d8642384ef7f37f0e6c5
$BLAKE2$2087c7c1e3f732cebf8c3a85d080515fb5ef49033b316c813e06bc779f3ba6c508afb05672f5c048d5104b5994dfcdb13a66760998af062f4015b02c4e830d85
$BLAKE2$f6fbd3bea8608a5621efbad1a615ad968b8da92f0c6632c9cb12378536a50cbc8347782092a0a8e30ce4224c05194263e3b95e30954d55b6ddbd8cb45e09a7e9
$BLAKE2$44ff6dcfc067b5f29c88b0577df922e806dcfbae33a08dd16ef4d534e180d35c147c1cfb8e7032ed8cd2b631dbceb309472cc0f13456149b904cbcefc735d845
Příkaz pro slovníkový útoku s pravidlem best64:
hashcat -m 600 -a 0 -o vystup_blake2b_desifrovani_pravidla_slovnik.txt hesla_blake2_slovnik_pravidla.txt /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-penryn-Intel(R) Pentium(R) CPU G620 @ 2.60GHz, 1536/3137 MB (512 MB allocatable), 2MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 4 digests; 4 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Rules: 77
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Not-Iterated
* Single-Salt
* Raw-Hash
* Uses-64-Bit
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 1104517645
Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 600 (BLAKE2b-512)
Hash.Target......: hesla_blake2_slovnik_pravidla.txt
Time.Started.....: Tue Apr 30 20:39:15 2024 (4 mins, 53 secs)
Time.Estimated...: Tue Apr 30 20:44:08 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Mod........: Rules (/usr/share/hashcat/rules/best64.rule)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 3773.5 kH/s (10.06ms) @ Accel:256 Loops:77 Thr:1 Vec:2
Recovered........: 3/4 (75.00%) Digests (total), 3/4 (75.00%) Digests (new)
Progress.........: 1104517645/1104517645 (100.00%)
Rejected.........: 238238/1104517645 (0.02%)
Restore.Point....: 14344385/14344385 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-77 Iteration:0-77
Candidate.Engine.: Device Generator
Candidates.#1....: $HEX[20687071313233] -> $HEX[04a156616d6f]
Hardware.Mon.#1..: Util: 98%
Started: Tue Apr 30 20:39:12 2024
Stopped: Tue Apr 30 20:44:09 2024
Výsledný soubor s prolomenými hashy:
$BLAKE2$44ff6dcfc067b5f29c88b0577df922e806dcfbae33a08dd16ef4d534e180d35c147c1cfb8e7032ed8cd2b631dbceb309472cc0f13456149b904cbcefc735d845:PassWord12
$BLAKE2$2087c7c1e3f732cebf8c3a85d080515fb5ef49033b316c813e06bc779f3ba6c508afb05672f5c048d5104b5994dfcdb13a66760998af062f4015b02c4e830d85:mojeheslo
$BLAKE2$f6fbd3bea8608a5621efbad1a615ad968b8da92f0c6632c9cb12378536a50cbc8347782092a0a8e30ce4224c05194263e3b95e30954d55b6ddbd8cb45e09a7e9:tajneheslo
Ve výsledném souboru jsou 3 prolomená hesla ze 4. Chybí zde první hašh, který obsahoval heslo: !nterNet
Srovnání rychlostí prolomení
Kombinovaný útok
Pro kombinovaný útok byl vytvořen nový slovník slovnik.txt pro zkombinování se slovníkem rockyou.txt. Slovnik.txt:
123456789
987654321
heslo
Heslo
hesloheslo
HesloHeslo
Příklad 1: MD5 kombinovaný útok
Seznam vstupních hashů pro kombinovaný útok:
5c8297c81245b5380b321dd9bf8cc29b
6ebe76c9fb411be97b3b0d48b791a7c9
955db0b81ef1989b4a4dfeae8061a9a6
3ea4db050dfd4daa3a93e9434c468776
e26256d0d2e39dc4fc5f5a28c593fcae
8c61ad09293001885517547926004dec
Příkaz kombinovaného útoku s využitím dvou slovníků rockyou.txt a slovnik.txt
hashcat -m 0 -a 1 hesla_md5_kombi.txt /usr/share/wordlists/rockyou.txt /usr/share/wordlists/slovnik.txt -o vystup_md5_kombinovany.txt -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Dictionary cache hit:
* Filename..: rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385
Dictionary cache built:
* Filename..: slovnik.txt
* Passwords.: 6
* Bytes.....: 54
* Keyspace..: 6
* Runtime...: 0 secs
Hashes: 8 digests; 8 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Meet-In-The-Middle
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
INFO: Removed 5 hashes found as potfile entries.
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 86066310
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 0 (MD5)
Hash.Target......: hesla_md5_kombi.txt
Time.Started.....: Fri Apr 19 15:54:21 2024 (0 secs)
Time.Estimated...: Fri Apr 19 15:54:21 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (rockyou.txt), Left Side
Guess.Mod........: File (slovnik.txt), Right Side
Speed.#1.........: 7223.2 kH/s (0.20ms) @ Accel:256 Loops:6 Thr:1 Vec:8
Recovered........: 8/8 (100.00%) Digests (total), 3/8 (37.50%) Digests (new)
Progress.........: 30720/86066310 (0.04%)
Rejected.........: 0/30720 (0.00%)
Restore.Point....: 4096/14344385 (0.03%)
Restore.Sub.#1...: Salt:0 Amplifier:0-6 Iteration:0-6
Candidate.Engine.: Device Generator
Candidates.#1....: newzealandHeslo -> babygrlHesloHeslo
Hardware.Mon.#1..: Util: 27%
Started: Fri Apr 19 15:54:20 2024
Stopped: Fri Apr 19 15:54:23 2024
Výsledný soubor s prolomenými hashy:
5c8297c81245b5380b321dd9bf8cc29b:123456789
6ebe76c9fb411be97b3b0d48b791a7c9:987654321
955db0b81ef1989b4a4dfeae8061a9a6:heslo
3ea4db050dfd4daa3a93e9434c468776:Heslo
e26256d0d2e39dc4fc5f5a28c593fcae:hesloheslo
8c61ad09293001885517547926004dec:HesloHeslo
Příklad 2: SHA-1 kombinovaný útok
Seznam vstupních hashů pro kombinovaný útok:
f7c3bc1d808e04732adf679965ccc34ca7ae3441
bfe54caa6d483cc3887dce9d1b8eb91408f1ea7a
6e017b5464f820a6c1bb5e9f6d711a667a80d8ea
894f36e5fe639267301de83d341819acc0a14d4b
d89082db4a519a5f3c4a4b46269c5333e4000fb7
f5af3142a33a54e1d2228ee7e9af31c832a24855
Příkaz kombinovaného útoku s využitím dvou slovníků rockyou.txt a slovnik.txt
hashcat -m 100 -a 1 -o vystup_sha1_kombi.txt hesla_sha1_kombi.txt /usr/share/wordlists/rockyou.txt /usr/share/wordlists/slovnik.txt -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385
Dictionary cache built:
* Filename..: /usr/share/wordlists/slovnik.txt
* Passwords.: 6
* Bytes.....: 54
* Keyspace..: 6
* Runtime...: 0 secs
Hashes: 6 digests; 6 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 86066310
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 100 (SHA1)
Hash.Target......: hesla_sha1_kombi.txt
Time.Started.....: Wed May 1 17:34:26 2024 (7 secs)
Time.Estimated...: Wed May 1 17:34:33 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt), Left Side
Guess.Mod........: File (/usr/share/wordlists/slovnik.txt), Right Side
Speed.#1.........: 589.0 kH/s (0.37ms) @ Accel:256 Loops:6 Thr:1 Vec:8
Recovered........: 6/6 (100.00%) Digests (total), 6/6 (100.00%) Digests (new)
Progress.........: 30720/86066310 (0.04%)
Rejected.........: 0/30720 (0.00%)
Restore.Point....: 4096/14344385 (0.03%)
Restore.Sub.#1...: Salt:0 Amplifier:0-6 Iteration:0-6
Candidate.Engine.: Device Generator
Candidates.#1....: newzealandHeslo -> babygrlHesloHeslo
Hardware.Mon.#1..: Util: 19%
Started: Wed May 1 17:34:24 2024
Stopped: Wed May 1 17:34:34 2024
Výsledný soubor s prolomenými hashy:
894f36e5fe639267301de83d341819acc0a14d4b:Heslo
6e017b5464f820a6c1bb5e9f6d711a667a80d8ea:heslo
f7c3bc1d808e04732adf679965ccc34ca7ae3441:123456789
bfe54caa6d483cc3887dce9d1b8eb91408f1ea7a:987654321
d89082db4a519a5f3c4a4b46269c5333e4000fb7:hesloheslo
f5af3142a33a54e1d2228ee7e9af31c832a24855:HesloHeslo
Příklad 3: SHA-256 kombinovaný útok
Seznam vstupních hashů pro kombinovaný útok:
15e2b0d3c33891ebb0f1ef609ec419420c20e320ce94c65fbc8c3312448eb225
8a9bcf1e51e812d0af8465a8dbcc9f741064bf0af3b3d08e6b0246437c19f7fb
56b1db8133d9eb398aabd376f07bf8ab5fc584ea0b8bd6a1770200cb613ca005
a522b2e58855d49bf2ca3754f625ff84613c5328421b29907ac6254b2380f97b
6de8ead8f2590b0437f137eafa3c03d145952e32bfe54a0525eb9371f72053f1
f10053ecd2e9e03327ac1ca371f1a10f9b0d990d8d0968a46dab9584c0d10ff9
Příkaz kombinovaného útoku s využitím dvou slovníků rockyou.txt a slovnik.txt
hashcat -m 1400 -a 1 -o vystup_sha256_kombi.txt hesla_sha256_kombi.txt /usr/share/wordlists/rockyou.txt /usr/share/wordlists/slovnik.txt -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385
Dictionary cache hit:
* Filename..: /usr/share/wordlists/slovnik.txt
* Passwords.: 6
* Bytes.....: 54
* Keyspace..: 6
Hashes: 6 digests; 6 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 86066310
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 1400 (SHA2-256)
Hash.Target......: hesla_sha256_kombi.txt
Time.Started.....: Wed May 1 17:36:34 2024 (22 secs)
Time.Estimated...: Wed May 1 17:36:56 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt), Left Side
Guess.Mod........: File (/usr/share/wordlists/slovnik.txt), Right Side
Speed.#1.........: 4684.7 kH/s (0.57ms) @ Accel:256 Loops:6 Thr:1 Vec:8
Recovered........: 6/6 (100.00%) Digests (total), 6/6 (100.00%) Digests (new)
Progress.........: 30720/86066310 (0.04%)
Rejected.........: 0/30720 (0.00%)
Restore.Point....: 4096/14344385 (0.03%)
Restore.Sub.#1...: Salt:0 Amplifier:0-6 Iteration:0-6
Candidate.Engine.: Device Generator
Candidates.#1....: newzealandHeslo -> babygrlHesloHeslo
Hardware.Mon.#1..: Util: 24%
Started: Wed May 1 17:36:32 2024
Stopped: Wed May 1 17:36:56 2024
Výsledný soubor s prolomenými hashy:
a522b2e58855d49bf2ca3754f625ff84613c5328421b29907ac6254b2380f97b:Heslo
56b1db8133d9eb398aabd376f07bf8ab5fc584ea0b8bd6a1770200cb613ca005:heslo
15e2b0d3c33891ebb0f1ef609ec419420c20e320ce94c65fbc8c3312448eb225:123456789
8a9bcf1e51e812d0af8465a8dbcc9f741064bf0af3b3d08e6b0246437c19f7fb:987654321
6de8ead8f2590b0437f137eafa3c03d145952e32bfe54a0525eb9371f72053f1:hesloheslo
f10053ecd2e9e03327ac1ca371f1a10f9b0d990d8d0968a46dab9584c0d10ff9:HesloHeslo
Příklad 4: BLAKE2b kombinovaný útok
Seznam vstupních hashů pro kombinovaný útok:
$BLAKE2$f5ab8bafa6f2f72b431188ac38ae2de7bb618fb3d38b6cbf639defcdd5e10a86b22fccff571da37e42b23b80b657ee4d936478f582280a87d6dbb1da73f5c47d
$BLAKE2$5f9b2deed8e02e62ff916f0b14095a7f94a5ee5a6fdaebe5a6ac101e094c83c93ba7ca3a28caaa4ad3876b5b628493f2f64ba55d64a3f02f3ca0e831ae862442
$BLAKE2$17dece361c74fe55cc73d9f2237161c99798078b1d7ee33f6d15fbde4a34ea7dddc62ab0c648ad1922ba5b364aef22b5caa0d32cdeadb7890d9c2c3be9bf1e99
$BLAKE2$6a96922a70a610cf34e7985e84422bfd32d7bfa9ae86ad10889209b39bda4104f1d26e5bb1c0bb6946f608c7c4aa66166373756ef6605dc9ff1786133f9f1dfa
$BLAKE2$6965b0e7d117b7de9a36d8443164edd7a4d15ca90bcdfcc9cd41b902a816922b21c2cee64f779983d365809a9d4c051c27f484c783b6245280266fdd667751bd
$BLAKE2$8ab82afd6c0a4b3ca0d98c434f74cbf48996255af5974af41ae8fb39b55e175a7cbb2838dce68dc191311785906fda35f33c9e4479cd39d0c32da875bd626965
Příkaz kombinovaného útoku s využitím dvou slovníků rockyou.txt a slovnik.txt
hashcat -m 600 -a 1 -o vystup_blake2b_kombi.txt hesla_blake2b_kombi.txt /usr/share/wordlists/rockyou.txt /usr/share/wordlists/slovnik.txt -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385
Dictionary cache hit:
* Filename..: /usr/share/wordlists/slovnik.txt
* Passwords.: 6
* Bytes.....: 54
* Keyspace..: 6
Hashes: 6 digests; 6 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Not-Iterated
* Single-Salt
* Raw-Hash
* Uses-64-Bit
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 86066310
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 600 (BLAKE2b-512)
Hash.Target......: hesla_blake2b_kombi.txt
Time.Started.....: Wed May 1 17:38:43 2024 (17 secs)
Time.Estimated...: Wed May 1 17:39:00 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt), Left Side
Guess.Mod........: File (/usr/share/wordlists/slovnik.txt), Right Side
Speed.#1.........: 3899.5 kH/s (0.79ms) @ Accel:256 Loops:6 Thr:1 Vec:4
Recovered........: 6/6 (100.00%) Digests (total), 6/6 (100.00%) Digests (new)
Progress.........: 30720/86066310 (0.04%)
Rejected.........: 0/30720 (0.00%)
Restore.Point....: 4096/14344385 (0.03%)
Restore.Sub.#1...: Salt:0 Amplifier:0-6 Iteration:0-6
Candidate.Engine.: Device Generator
Candidates.#1....: newzealandHeslo -> babygrlHesloHeslo
Hardware.Mon.#1..: Util: 27%
Started: Wed May 1 17:38:39 2024
Stopped: Wed May 1 17:39:02 2024
Výsledný soubor s prolomenými hashy:
$BLAKE2$6a96922a70a610cf34e7985e84422bfd32d7bfa9ae86ad10889209b39bda4104f1d26e5bb1c0bb6946f608c7c4aa66166373756ef6605dc9ff1786133f9f1dfa:Heslo
$BLAKE2$17dece361c74fe55cc73d9f2237161c99798078b1d7ee33f6d15fbde4a34ea7dddc62ab0c648ad1922ba5b364aef22b5caa0d32cdeadb7890d9c2c3be9bf1e99:heslo
$BLAKE2$f5ab8bafa6f2f72b431188ac38ae2de7bb618fb3d38b6cbf639defcdd5e10a86b22fccff571da37e42b23b80b657ee4d936478f582280a87d6dbb1da73f5c47d:123456789
$BLAKE2$5f9b2deed8e02e62ff916f0b14095a7f94a5ee5a6fdaebe5a6ac101e094c83c93ba7ca3a28caaa4ad3876b5b628493f2f64ba55d64a3f02f3ca0e831ae862442:987654321
$BLAKE2$6965b0e7d117b7de9a36d8443164edd7a4d15ca90bcdfcc9cd41b902a816922b21c2cee64f779983d365809a9d4c051c27f484c783b6245280266fdd667751bd:hesloheslo
$BLAKE2$8ab82afd6c0a4b3ca0d98c434f74cbf48996255af5974af41ae8fb39b55e175a7cbb2838dce68dc191311785906fda35f33c9e4479cd39d0c32da875bd626965:HesloHeslo
Srovnání rychlostí prolomení
Útok s maskou
V těchto útocích se používá tzv. maska. Pokud máme informace týkající se hesla, můžeme provést tento typ útoku a masku přidat. Informace jako délka hesla, či zda se vyskytuje v hesle písmeno, číslo, speciální znak, apod. Hashcat má zabudované následující znakové sady, které se dají použít jako maska:
- ?l = abcdefghijklmnopqrstuvwxyz
- ?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ
- ?d = 0123456789
- ?h = 0123456789abcdef
- ?H = 0123456789ABCDEF
- ?s = „mezera“!“#$%&'()*+,-./:;<=>?@[\]^_`{|}~
- ?a = ?l?u?d?s
- ?b = 0x00 – 0xff
Hashcat rovněž umožňuje vytvořit si vlastní znakovou sadu. Taktéž umožňuje zaznamenat masky do souboru a při útoku se pak na něj odkazovat. Hashcat přichází s několika předgenerovanými maskami, které jsou uloženy v adresáři masks. Pokud se ovšem pracuje s maskou delší, než 8 znaků, může se čas k prolomení hesla velmi zvýšit.
Příklad 1: MD5 útok s maskou
Seznam vstupních hashů pro útok s maskou:
0192023a7bbd73250516f069df18b500
b5eb89b5b55d851cc721fe62a18dedab
d41a83379cf8e7573679073a52e29f1b
Příkaz útoku maskou. V útoku je použita maska dlouhá 8 znaků, 5 znaků jsou malá písmena a 3 znaky jsou číslo od 0 do 9 nebo malé písmeno. Neboli se hledá heslo, které je 8 znaků dlouhé, obsahuje 5 malých písmen, po kterých následujou 3 čísla nebo malá písmena od a do f.
hashcat -m 0 -a 3 -o vystup_md5_mask.txt hesla_md5_mask.txt ?l?l?l?l?l?h?h?h -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 55
Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Meet-In-The-Middle
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Brute-Force
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
INFO: Removed 2 hashes found as potfile entries.
Host memory required for this attack: 0 MB
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 0 (MD5)
Hash.Target......: hesla_md5_mask.txt
Time.Started.....: Wed May 1 21:07:52 2024 (2 mins, 32 secs)
Time.Estimated...: Wed May 1 21:10:24 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Mask.......: ?l?l?l?l?l?h?h?h [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 109.4 MH/s (1.12ms) @ Accel:256 Loops:128 Thr:1 Vec:8
Recovered........: 3/3 (100.00%) Digests (total), 1/3 (33.33%) Digests (new)
Progress.........: 16362905600/48666116096 (33.62%)
Rejected.........: 0/16362905600 (0.00%)
Restore.Point....: 930816/2768896 (33.62%)
Restore.Sub.#1...: Salt:0 Amplifier:2688-2816 Iteration:0-128
Candidate.Engine.: Device Generator
Candidates.#1....: rqmvx185 -> jigqd185
Hardware.Mon.#1..: Util: 86%
Started: Wed May 1 21:07:49 2024
Stopped: Wed May 1 21:10:26 2024
Výsledný soubor s prolomenými hashy:
0192023a7bbd73250516f069df18b500:admin123
b5eb89b5b55d851cc721fe62a18dedab:vwxyz000
d41a83379cf8e7573679073a52e29f1b:passabcd
Příklad 2: SHA-1 útok s maskou
Seznam vstupních hashů pro útok s maskou:
f865b53623b121fd34ee5426c792e5c33af8c227
8e4c60189118fd1a9c9867e982084086afaa74ab
f376297e4403832d40029dfcc113ffd207252b46
Příkaz útoku maskou. V útoku je použita maska dlouhá 8 znaků, 5 znaků jsou malá písmena a 3 znaky jsou číslo od 0 do 9 nebo malé písmeno. Neboli se hledá heslo, které je 8 znaků dlouhé, obsahuje 5 malých písmen, po kterých následujou 3 čísla nebo malá písmena od a do f.
hashcat -m 100 -a 3 -o vystup_sha1_mask.txt hesla_sha1_mask.txt ?l?l?l?l?l?h?h?h -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 55
Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Brute-Force
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
INFO: Removed 2 hashes found as potfile entries.
Host memory required for this attack: 0 MB
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 100 (SHA1)
Hash.Target......: hesla_sha1_mask.txt
Time.Started.....: Wed May 1 21:12:39 2024 (2 mins, 33 secs)
Time.Estimated...: Wed May 1 21:15:12 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Mask.......: ?l?l?l?l?l?h?h?h [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 105.1 MH/s (9.52ms) @ Accel:256 Loops:1024 Thr:1 Vec:8
Recovered........: 3/3 (100.00%) Digests (total), 1/3 (33.33%) Digests (new)
Progress.........: 16363167744/48666116096 (33.62%)
Rejected.........: 0/16363167744 (0.00%)
Restore.Point....: 930816/2768896 (33.62%)
Restore.Sub.#1...: Salt:0 Amplifier:2048-3072 Iteration:0-1024
Candidate.Engine.: Device Generator
Candidates.#1....: orovx185 -> bctqd185
Hardware.Mon.#1..: Util: 95%
Started: Wed May 1 21:12:35 2024
Stopped: Wed May 1 21:15:14 2024
Výsledný soubor s prolomenými hashy:
f865b53623b121fd34ee5426c792e5c33af8c227:admin123
8e4c60189118fd1a9c9867e982084086afaa74ab:vwxyz000
f376297e4403832d40029dfcc113ffd207252b46:passabcd
Příklad 3: SHA-256 útok s maskou
Seznam vstupních hashů pro útok s maskou:
240be518fabd2724ddb6f04eeb1da5967448d7e831c08c8fa822809f74c720a9
0504d2f9eb5de1cdd46e6c6444ec85e0978d03bd72918e38527679bd3be0c809
71f155919a20ed11274dac375f8a0cf4d7c4e4c38cb35f79cd509c21e75e4c2e
Příkaz útoku maskou. V útoku je použita maska dlouhá 8 znaků, 5 znaků jsou malá písmena a 3 znaky jsou číslo od 0 do 9 nebo malé písmeno. Neboli se hledá heslo, které je 8 znaků dlouhé, obsahuje 5 malých písmen, po kterých následujou 3 čísla nebo malá písmena od a do f.
hashcat -m 1400 -a 3 -o vystup_sha256_mask.txt hesla_sha256_mask.txt ?l?l?l?l?l?h?h?h -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 55
Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Brute-Force
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
INFO: Removed 2 hashes found as potfile entries.
Host memory required for this attack: 0 MB
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 1400 (SHA2-256)
Hash.Target......: hesla_sha256_mask.txt
Time.Started.....: Wed May 1 21:17:34 2024 (6 mins, 37 secs)
Time.Estimated...: Wed May 1 21:24:11 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Mask.......: ?l?l?l?l?l?h?h?h [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 41317.5 kH/s (11.43ms) @ Accel:256 Loops:512 Thr:1 Vec:8
Recovered........: 3/3 (100.00%) Digests (total), 1/3 (33.33%) Digests (new)
Progress.........: 16363167744/48666116096 (33.62%)
Rejected.........: 0/16363167744 (0.00%)
Restore.Point....: 930816/2768896 (33.62%)
Restore.Sub.#1...: Salt:0 Amplifier:2560-3072 Iteration:0-512
Candidate.Engine.: Device Generator
Candidates.#1....: hwovx185 -> bctqd185
Hardware.Mon.#1..: Util: 96%
Started: Wed May 1 21:17:31 2024
Stopped: Wed May 1 21:24:12 2024
Výsledný soubor s prolomenými hashy:
240be518fabd2724ddb6f04eeb1da5967448d7e831c08c8fa822809f74c720a9:admin123
0504d2f9eb5de1cdd46e6c6444ec85e0978d03bd72918e38527679bd3be0c809:vwxyz000
71f155919a20ed11274dac375f8a0cf4d7c4e4c38cb35f79cd509c21e75e4c2e:passabcd
Příklad 4: BLAKE2b útok s maskou
Seznam vstupních hashů pro útok s maskou:
$BLAKE2$eba34065a1d45b3bfd700926b250ee119b42b331977b43b61f6c9d383fcb8f2d898d2b003253796e0eda3a37d3fdffd131758ad348e94dfe9685f787c7911a42
$BLAKE2$76e3745fd2f0a03573531a2f6c11bbc28f10456bb64da87be9f7dcf0c19f5143abd33007531cf93b740d5db602bb4343c3b1286294ce9c767e4f8fa992b9c2fa
$BLAKE2$c96677741b3d258a80ce784e3e24625cd1c3f281f9f0ea70d108333859961556534d8f36a4a95cec8359c169576f3aa28b776387372455a87ccc8582d6d534ce
Příkaz útoku maskou. V útoku je použita maska dlouhá 8 znaků, 5 znaků jsou malá písmena a 3 znaky jsou číslo od 0 do 9 nebo malé písmeno. Neboli se hledá heslo, které je 8 znaků dlouhé, obsahuje 5 malých písmen, po kterých následujou 3 čísla nebo malá písmena od a do f.
hashcat -m 600 -a 3 -o vystup_blake2b_mask.txt hesla_blake2b_mask.txt ?l?l?l?l?l?h?h?h -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 55
Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Not-Iterated
* Single-Salt
* Brute-Force
* Raw-Hash
* Uses-64-Bit
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Approaching final keyspace - workload adjusted.
Session..........: hashcat
Status...........: Exhausted
Hash.Mode........: 600 (BLAKE2b-512)
Hash.Target......: hesla_blake2b_mask.txt
Time.Started.....: Wed May 1 19:17:34 2024 (1 hour, 7 mins)
Time.Estimated...: Wed May 1 20:24:43 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Mask.......: ?l?l?l?l?l?h?h?h [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 12360.3 kH/s (9.06ms) @ Accel:72 Loops:512 Thr:1 Vec:4
Recovered........: 2/3 (66.67%) Digests (total), 2/3 (66.67%) Digests (new)
Progress.........: 48666116096/48666116096 (100.00%)
Rejected.........: 0/48666116096 (0.00%)
Restore.Point....: 2768896/2768896 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:17408-17576 Iteration:0-512
Candidate.Engine.: Device Generator
Candidates.#1....: fkxhzf6e -> xqxqxf6e
Hardware.Mon.#1..: Util: 88%
Started: Wed May 1 19:17:09 2024
Stopped: Wed May 1 20:24:45 2024
Výsledný soubor s prolomenými hashy:
$BLAKE2$eba34065a1d45b3bfd700926b250ee119b42b331977b43b61f6c9d383fcb8f2d898d2b003253796e0eda3a37d3fdffd131758ad348e94dfe9685f787c7911a42:admin123
$BLAKE2$76e3745fd2f0a03573531a2f6c11bbc28f10456bb64da87be9f7dcf0c19f5143abd33007531cf93b740d5db602bb4343c3b1286294ce9c767e4f8fa992b9c2fa:passabcd
$BLAKE2$c96677741b3d258a80ce784e3e24625cd1c3f281f9f0ea70d108333859961556534d8f36a4a95cec8359c169576f3aa28b776387372455a87ccc8582d6d534ce:vwxyz000
Srovnání rychlostí prolomení
Hybridní útok
Hybridní útok kombinuje slovníkový útok a útok maskou. Tento typ útoku zdokonaluje nedostatky obou typů útoků. U hybridních útoků se určuje umístění použití masky, jestli před slovem hledaným slovníkem (-a 7) nebo za slovem (-a 6). Nelze použít obě umístění současně.
Příklad 1: MD5 hybridní útok
Seznam vstupních hashů pro hybridní útok.
1f61b744f2c9e8f49ae4c4965f39963f
69a9da126e60768f5d294051ce9069e3
261e5e7e83ae4b142f6684e87540cd57
Příkaz hybridního útoku. Nejprve se vyhledává slovo pomocí slovníku rockyou.txt, a poté se použije maska dlouhá 2 znaky a obsahuje buď 2 čísla nebo 2 velká písmena od A do F.
hashcat -m 0 -a 6 -o vystup_md5_hybrid.txt hesla_md5_hybrid.txt /usr/share/wordlists/rockyou.txt ?H?H -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Meet-In-The-Middle
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
INFO: Removed 2 hashes found as potfile entries.
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 3672162560
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 0 (MD5)
Hash.Target......: hesla_md5_hybrid.txt
Time.Started.....: Wed May 1 21:54:06 2024 (1 sec)
Time.Estimated...: Wed May 1 21:54:07 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt), Left Side
Guess.Mod........: Mask (?H?H) [2], Right Side
Guess.Queue.Base.: 1/1 (100.00%)
Guess.Queue.Mod..: 1/1 (100.00%)
Speed.#1.........: 57473.5 kH/s (3.66ms) @ Accel:256 Loops:256 Thr:1 Vec:8
Recovered........: 3/3 (100.00%) Digests (total), 1/3 (33.33%) Digests (new)
Progress.........: 30146816/3672162560 (0.82%)
Rejected.........: 256/30146816 (0.00%)
Restore.Point....: 116737/14344385 (0.81%)
Restore.Sub.#1...: Salt:0 Amplifier:0-256 Iteration:0-256
Candidate.Engine.: Device Generator
Candidates.#1....: luckystar112 -> gloriatreviE8
Hardware.Mon.#1..: Util: 30%
Started: Wed May 1 21:54:03 2024
Stopped: Wed May 1 21:54:08 2024
Výsledný soubor s prolomenými hashy:
1f61b744f2c9e8f49ae4c4965f39963f:pass19
69a9da126e60768f5d294051ce9069e3:word28
261e5e7e83ae4b142f6684e87540cd57:kaliFF
Příklad 2: SHA-1 hybridní útok
Seznam vstupních hashů pro hybridní útok.
7c816708ff015453787c83c4d0c00ddf93357fd3
7e17878fcbb5701b0b9bc79fc74fe3219aa9c3f0
2f61f0ac3a4c764c45290029acacfbaa953a1140
Příkaz hybridního útoku. Nejprve se vyhledává slovo pomocí slovníku rockyou.txt, a poté se použije maska dlouhá 2 znaky a obsahuje buď 2 čísla nebo 2 velká písmena od A do F.
hashcat -m 100 -a 6 -o vystup_sha1_hybrid.txt hesla_sha1_hybrid.txt /usr/share/wordlists/rockyou.txt ?H?H -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Initializing backend runtime for device #1. Please be patient...
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 3672162560
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 100 (SHA1)
Hash.Target......: hesla_sha1_hybrid.txt
Time.Started.....: Wed May 1 21:56:23 2024 (0 secs)
Time.Estimated...: Wed May 1 21:56:23 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt), Left Side
Guess.Mod........: Mask (?H?H) [2], Right Side
Guess.Queue.Base.: 1/1 (100.00%)
Guess.Queue.Mod..: 1/1 (100.00%)
Speed.#1.........: 48745.0 kH/s (4.67ms) @ Accel:256 Loops:256 Thr:1 Vec:8
Recovered........: 3/3 (100.00%) Digests (total), 3/3 (100.00%) Digests (new)
Progress.........: 30146816/3672162560 (0.82%)
Rejected.........: 256/30146816 (0.00%)
Restore.Point....: 116737/14344385 (0.81%)
Restore.Sub.#1...: Salt:0 Amplifier:0-256 Iteration:0-256
Candidate.Engine.: Device Generator
Candidates.#1....: luckystar112 -> gloriatreviE8
Hardware.Mon.#1..: Util: 28%
Started: Wed May 1 21:55:55 2024
Stopped: Wed May 1 21:56:24 2024
Výsledný soubor s prolomenými hashy:
7c816708ff015453787c83c4d0c00ddf93357fd3:pass19
7e17878fcbb5701b0b9bc79fc74fe3219aa9c3f0:word28
2f61f0ac3a4c764c45290029acacfbaa953a1140:kaliFF
Příklad 3: SHA-256 hybridní útok
Seznam vstupních hashů pro hybridní útok.
871431053023291d24b403f1f9d761c6f01b3050a0a83cd9d9759a970f8d4d92
f064d2d3afa4f7b89eee81b033a8cb927564866793bc59031525ca776c10a6fc
34207f580ff5026b7c5686c314aa52114674ea1ae57b5ddf7a775151a131de04
Příkaz hybridního útoku. Nejprve se vyhledává slovo pomocí slovníku rockyou.txt, a poté se použije maska dlouhá 2 znaky a obsahuje buď 2 čísla nebo 2 velká písmena od A do F.
hashcat -m 1400 -a 6 -o vystup_sha256_hybrid.txt hesla_sha256_hybrid.txt /usr/share/wordlists/rockyou.txt ?H?H -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 3672162560
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 1400 (SHA2-256)
Hash.Target......: hesla_sha256_hybrid.txt
Time.Started.....: Wed May 1 21:58:22 2024 (1 sec)
Time.Estimated...: Wed May 1 21:58:23 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt), Left Side
Guess.Mod........: Mask (?H?H) [2], Right Side
Guess.Queue.Base.: 1/1 (100.00%)
Guess.Queue.Mod..: 1/1 (100.00%)
Speed.#1.........: 24835.0 kH/s (9.38ms) @ Accel:256 Loops:256 Thr:1 Vec:8
Recovered........: 3/3 (100.00%) Digests (total), 3/3 (100.00%) Digests (new)
Progress.........: 30146816/3672162560 (0.82%)
Rejected.........: 256/30146816 (0.00%)
Restore.Point....: 116737/14344385 (0.81%)
Restore.Sub.#1...: Salt:0 Amplifier:0-256 Iteration:0-256
Candidate.Engine.: Device Generator
Candidates.#1....: luckystar112 -> gloriatreviE8
Hardware.Mon.#1..: Util: 94%
Started: Wed May 1 21:57:50 2024
Stopped: Wed May 1 21:58:25 2024
Výsledný soubor s prolomenými hashy:
871431053023291d24b403f1f9d761c6f01b3050a0a83cd9d9759a970f8d4d92:pass19
f064d2d3afa4f7b89eee81b033a8cb927564866793bc59031525ca776c10a6fc:word28
34207f580ff5026b7c5686c314aa52114674ea1ae57b5ddf7a775151a131de04:kaliFF
Příklad 4: BLAKE2b hybridní útok
Seznam vstupních hashů pro hybridní útok.
$BLAKE2$f3701b37a18c7723dfc7672c7c6d1d27252220c849579eb568484d38fcc0e5c2de4e6ab5ce3955c4e3d84c43db2f2c0f5b204a42e9c52cad1115a941497c3865
$BLAKE2$1690910baa271a409e223b51922fe28237360cfbed9418ad79f210c864eeb1a731f6114bf4ce83da20cfe7b4a8636001f7155c1f1d471d2e35a93ad3c063d287
$BLAKE2$b53b59ed631b415d31d5dee718d9ab2a904a8c8c3c1580ad3cf2b819cecc1d0eae8771b55295909b3e1491e82f2575a51cab450909f24c0451dee5222bb32e16
Příkaz hybridního útoku. Nejprve se vyhledává slovo pomocí slovníku rockyou.txt, a poté se použije maska dlouhá 2 znaky a obsahuje buď 2 čísla nebo 2 velká písmena od A do F.
hashcat -m 600 -a 6 -o vystup_blake2b_hybrid.txt hesla_blake2b_hybrid.txt /usr/share/wordlists/rockyou.txt ?H?H -O
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 3 digests; 3 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Not-Iterated
* Single-Salt
* Raw-Hash
* Uses-64-Bit
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 0 MB
Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 3672162560
Session..........: hashcat
Status...........: Cracked
Hash.Mode........: 600 (BLAKE2b-512)
Hash.Target......: hesla_blake2b_hybrid.txt
Time.Started.....: Wed May 1 22:00:14 2024 (3 secs)
Time.Estimated...: Wed May 1 22:00:17 2024 (0 secs)
Kernel.Feature...: Optimized Kernel
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt), Left Side
Guess.Mod........: Mask (?H?H) [2], Right Side
Guess.Queue.Base.: 1/1 (100.00%)
Guess.Queue.Mod..: 1/1 (100.00%)
Speed.#1.........: 10093.9 kH/s (0.68ms) @ Accel:256 Loops:8 Thr:1 Vec:4
Recovered........: 3/3 (100.00%) Digests (total), 3/3 (100.00%) Digests (new)
Progress.........: 29966592/3672162560 (0.82%)
Rejected.........: 256/29966592 (0.00%)
Restore.Point....: 116737/14344385 (0.81%)
Restore.Sub.#1...: Salt:0 Amplifier:72-80 Iteration:0-8
Candidate.Engine.: Device Generator
Candidates.#1....: luckystar175 -> gloriatreviEE
Hardware.Mon.#1..: Util: 86%
Started: Wed May 1 21:59:50 2024
Stopped: Wed May 1 22:00:19 2024
Výsledný soubor s prolomenými hashy:
$BLAKE2$f3701b37a18c7723dfc7672c7c6d1d27252220c849579eb568484d38fcc0e5c2de4e6ab5ce3955c4e3d84c43db2f2c0f5b204a42e9c52cad1115a941497c3865:pass19
$BLAKE2$1690910baa271a409e223b51922fe28237360cfbed9418ad79f210c864eeb1a731f6114bf4ce83da20cfe7b4a8636001f7155c1f1d471d2e35a93ad3c063d287:word28
$BLAKE2$b53b59ed631b415d31d5dee718d9ab2a904a8c8c3c1580ad3cf2b819cecc1d0eae8771b55295909b3e1491e82f2575a51cab450909f24c0451dee5222bb32e16:kaliFF
Srovnání rychlostí prolomení
Bruteforce útok
Hashcat může být použit k hrubému prolomení hesel pomocí systematického zkoušení všech možných kombinací znaků. Časově velmi náročné ! Tento typ útoku byl testován na dvou strojích pro srovnání výkonů mezi virtuálem Kali Linux a železem stolním počítačem.
Seznam vstupních hashu MD5 pro bruteforce útok.
dc647eb65e6711e155375218212b3964
eb61eead90e3b899c6bcbe27ac581660
958152288f2d2303ae045cffc43a02cd
2c9341ca4cf3d87b9e4eb905d6a3ec45
75b71aa6842e450f12aca00fdf54c51d
031cbcccd3ba6bd4d1556330995b8d08
b5af0b804ff7238bce48adef1e0c213f
Příkaz pro bruteforce útok:
Poznámka: ?a = ?l?u?d?s (malá a velká písmena, čísla, speciální znaky)
hashcat -m 0 -a 3 -o vystup_bruteforce.txt hesla_bruteforce.txt ?a?a?a?a?a?a?a?a -O -S
hashcat (v6.2.6) starting
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 7 digests; 7 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Meet-In-The-Middle
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Brute-Force
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 2 MB
Session..........: hashcat
Status...........: Quit
Hash.Mode........: 0 (MD5)
Hash.Target......: hesla_bruteforce.txt
Time.Started.....: Thu May 2 17:53:27 2024 (2 hours, 0 mins)
Time.Estimated...: Tue Nov 18 21:04:16 2121 (97 years, 199 days)
Kernel.Feature...: Optimized Kernel
Guess.Mask.......: ?a?a?a?a?a?a?a?a [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 2155.2 kH/s (0.11ms) @ Accel:256 Loops:1 Thr:1 Vec:8
Recovered........: 1/7 (14.29%) Digests (total), 1/7 (14.29%) Digests (new)
Progress.........: 15045824512/6634204312890625 (0.00%)
Rejected.........: 0/15045824512 (0.00%)
Restore.Point....: 15045824512/6634204312890625 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Host Generator + PCIe
Candidates.#1....: r9Of.san -> ^S&:wane
Hardware.Mon.#1..: Util: 37%
Started: Thu May 2 17:52:59 2024
Stopped: Thu May 2 19:53:41 2024
hashcat.exe -m 0 -a 3 -o vystup_bruteforce.txt hesla_bruteforce.txt ?a?a?a?a?a?a?a?a -O -S
hashcat (v6.2.6) starting
Successfully initialized the NVIDIA main driver CUDA runtime library.
Failed to initialize NVIDIA RTC library.
* Device #1: CUDA SDK Toolkit not installed or incorrectly installed.
CUDA SDK Toolkit required for proper device support and utilization.
Falling back to OpenCL runtime.
* Device #1: WARNING! Kernel exec timeout is not disabled.
This may cause "CL_OUT_OF_RESOURCES" or related errors.
To disable the timeout, see: https://hashcat.net/q/timeoutpatch
OpenCL API (OpenCL 3.0 CUDA 12.4.131) - Platform #1 [NVIDIA Corporation]
========================================================================
* Device #1: NVIDIA GeForce RTX 2060, 6016/6143 MB (1535 MB allocatable), 30MCU
Minimum password length supported by kernel: 0
Maximum password length supported by kernel: 31
Hashes: 7 digests; 7 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Optimizers applied:
* Optimized-Kernel
* Zero-Byte
* Precompute-Init
* Meet-In-The-Middle
* Early-Skip
* Not-Salted
* Not-Iterated
* Single-Salt
* Brute-Force
* Raw-Hash
Watchdog: Temperature abort trigger set to 90c
Host memory required for this attack: 856 MB
Session..........: hashcat
Status...........: Quit
Hash.Mode........: 0 (MD5)
Hash.Target......: hesla_bruteforce.txt
Time.Started.....: Thu May 02 17:30:35 2024 (2 hours, 0 mins)
Time.Estimated...: Fri Nov 04 21:38:27 2146 (122 years, 185 days)
Kernel.Feature...: Optimized Kernel
Guess.Mask.......: ?a?a?a?a?a?a?a?a [8]
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........: 1716.0 kH/s (1.22ms) @ Accel:128 Loops:1 Thr:32 Vec:1
Recovered........: 1/7 (14.29%) Digests (total), 1/7 (14.29%) Digests (new)
Progress.........: 12380528640/6634204312890625 (0.00%)
Rejected.........: 0/12380528640 (0.00%)
Restore.Point....: 12380528640/6634204312890625 (0.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidate.Engine.: Host Generator + PCIe
Candidates.#1....: dG12FESS -> WwbyCANA
Hardware.Mon.#1..: Temp: 49c Fan: 26% Util: 21% Core: 375MHz Mem: 405MHz Bus:16
Started: Thu May 02 17:30:29 2024
Stopped: Thu May 02 19:30:58 2024
Výstup prolomených hesle po 2. hodinách útoku.
cat hesla_bruteforce.txt
2c9341ca4cf3d87b9e4eb905d6a3ec45:Test1234
V obou bruteforce útocích byl výsledek 1 prolomené heslo ze 7 možných.
Vstupní soubor obsahoval tyto hesla:
Password --> dc647eb65e6711e155375218212b3964
HELLO --> eb61eead90e3b899c6bcbe27ac581660
MYSECRET --> 958152288f2d2303ae045cffc43a02cd
Test1234 --> 2c9341ca4cf3d87b9e4eb905d6a3ec45
P455w0rd --> 75b71aa6842e450f12aca00fdf54c51d
GuessMe --> 031cbcccd3ba6bd4d1556330995b8d08
S3CuReP455Word --> b5af0b804ff7238bce48adef1e0c213f
Benchmark testy
Porovnání výkonů při hashbreakingu dvou strojů, virtuálu Kali Linux, který pro hashbreaking využíval procesor Intel Core i5-8300H @ 2.30GHz omezen na 4 jádra a stolního počítače, který pro hashbreaking využíval grafickou kartu Nvidia GeForce RTX 2060 s 30 jádry. Pro toto porovnání bylo využito benchmark testů pomocí příkazu hashcat -b.
hashcat -b
hashcat (v6.2.6) starting in benchmark mode
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
OpenCL API (OpenCL 3.0 CUDA 12.4.131) - Platform #1 [NVIDIA Corporation]
==================================================================================================================================================
* Device #1: NVIDIA GeForce RTX 2060, 6016/6143 MB (1535 MB allocatable), 30MCU
Benchmark relevant options:
===========================
* --optimized-kernel-enable
-------------------
* Hash-Mode 0 (MD5)
-------------------
Speed.#1.........: 24985.7 MH/s (39.99ms) @ Accel:256 Loops:1024 Thr:128 Vec:8
----------------------
* Hash-Mode 100 (SHA1)
----------------------
Speed.#1.........: 7772.9 MH/s (64.36ms) @ Accel:512 Loops:512 Thr:64 Vec:1
---------------------------
* Hash-Mode 1400 (SHA2-256)
---------------------------
Speed.#1.........: 3410.8 MH/s (73.46ms) @ Accel:32 Loops:1024 Thr:256 Vec:1
---------------------------
* Hash-Mode 1700 (SHA2-512)
---------------------------
Speed.#1.........: 997.4 MH/s (62.79ms) @ Accel:8 Loops:1024 Thr:256 Vec:1
-------------------------------------------------------------
* Hash-Mode 22000 (WPA-PBKDF2-PMKID+EAPOL) [Iterations: 4095]
-------------------------------------------------------------
Speed.#1.........: 396.0 kH/s (76.79ms) @ Accel:128 Loops:128 Thr:256 Vec:1
-----------------------
* Hash-Mode 1000 (NTLM)
-----------------------
Speed.#1.........: 45297.9 MH/s (21.86ms) @ Accel:256 Loops:1024 Thr:128 Vec:8
---------------------
* Hash-Mode 3000 (LM)
---------------------
Speed.#1.........: 23269.8 MH/s (42.90ms) @ Accel:256 Loops:1024 Thr:128 Vec:1
--------------------------------------------
* Hash-Mode 5500 (NetNTLMv1 / NetNTLMv1+ESS)
--------------------------------------------
Speed.#1.........: 24257.2 MH/s (41.15ms) @ Accel:128 Loops:1024 Thr:256 Vec:2
----------------------------
* Hash-Mode 5600 (NetNTLMv2)
----------------------------
Speed.#1.........: 1766.8 MH/s (70.89ms) @ Accel:32 Loops:512 Thr:256 Vec:1
--------------------------------------------------------
* Hash-Mode 1500 (descrypt, DES (Unix), Traditional DES)
--------------------------------------------------------
Speed.#1.........: 944.6 MH/s (66.26ms) @ Accel:16 Loops:1024 Thr:128 Vec:1
------------------------------------------------------------------------------
* Hash-Mode 500 (md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)) [Iterations: 1000]
------------------------------------------------------------------------------
Speed.#1.........: 9514.7 kH/s (86.99ms) @ Accel:128 Loops:1000 Thr:256 Vec:1
----------------------------------------------------------------
* Hash-Mode 3200 (bcrypt $2*$, Blowfish (Unix)) [Iterations: 32]
----------------------------------------------------------------
Speed.#1.........: 16800 H/s (72.46ms) @ Accel:4 Loops:32 Thr:11 Vec:1
--------------------------------------------------------------------
* Hash-Mode 1800 (sha512crypt $6$, SHA512 (Unix)) [Iterations: 5000]
--------------------------------------------------------------------
Speed.#1.........: 156.1 kH/s (41.32ms) @ Accel:4096 Loops:256 Thr:32 Vec:1
--------------------------------------------------------
* Hash-Mode 7500 (Kerberos 5, etype 23, AS-REQ Pre-Auth)
--------------------------------------------------------
Speed.#1.........: 390.5 MH/s (80.31ms) @ Accel:256 Loops:128 Thr:32 Vec:1
-------------------------------------------------
* Hash-Mode 13100 (Kerberos 5, etype 23, TGS-REP)
-------------------------------------------------
Speed.#1.........: 374.9 MH/s (83.66ms) @ Accel:256 Loops:128 Thr:32 Vec:1
---------------------------------------------------------------------------------
* Hash-Mode 15300 (DPAPI masterkey file v1 (context 1 and 2)) [Iterations: 23999]
---------------------------------------------------------------------------------
Speed.#1.........: 68504 H/s (75.85ms) @ Accel:32 Loops:512 Thr:256 Vec:1
---------------------------------------------------------------------------------
* Hash-Mode 15900 (DPAPI masterkey file v2 (context 1 and 2)) [Iterations: 12899]
---------------------------------------------------------------------------------
Speed.#1.........: 38924 H/s (60.08ms) @ Accel:64 Loops:512 Thr:32 Vec:1
------------------------------------------------------------------
* Hash-Mode 7100 (macOS v10.8+ (PBKDF2-SHA512)) [Iterations: 1023]
------------------------------------------------------------------
Speed.#1.........: 418.0 kH/s (62.31ms) @ Accel:32 Loops:1023 Thr:32 Vec:1
---------------------------------------------
* Hash-Mode 11600 (7-Zip) [Iterations: 16384]
---------------------------------------------
Speed.#1.........: 381.9 kH/s (75.79ms) @ Accel:128 Loops:4096 Thr:32 Vec:1
------------------------------------------------
* Hash-Mode 12500 (RAR3-hp) [Iterations: 262144]
------------------------------------------------
Speed.#1.........: 37319 H/s (101.94ms) @ Accel:8 Loops:16384 Thr:256 Vec:1
--------------------------------------------
* Hash-Mode 13000 (RAR5) [Iterations: 32799]
--------------------------------------------
Speed.#1.........: 42224 H/s (90.40ms) @ Accel:32 Loops:512 Thr:256 Vec:1
--------------------------------------------------------------------------------
* Hash-Mode 6211 (TrueCrypt RIPEMD160 + XTS 512 bit (legacy)) [Iterations: 1999]
--------------------------------------------------------------------------------
Speed.#1.........: 294.3 kH/s (93.76ms) @ Accel:16 Loops:512 Thr:256 Vec:1
-----------------------------------------------------------------------------------
* Hash-Mode 13400 (KeePass 1 (AES/Twofish) and KeePass 2 (AES)) [Iterations: 24569]
-----------------------------------------------------------------------------------
Speed.#1.........: 25459 H/s (50.02ms) @ Accel:8 Loops:512 Thr:256 Vec:1
----------------------------------------------------------------
* Hash-Mode 6800 (LastPass + LastPass sniffed) [Iterations: 499]
----------------------------------------------------------------
Speed.#1.........: 2549.0 kH/s (58.38ms) @ Accel:64 Loops:249 Thr:256 Vec:1
--------------------------------------------------------------------
* Hash-Mode 11300 (Bitcoin/Litecoin wallet.dat) [Iterations: 200459]
--------------------------------------------------------------------
Speed.#1.........: 5147 H/s (60.69ms) @ Accel:32 Loops:256 Thr:256 Vec:1
Started: Thu May 02 19:35:17 2024
Stopped: Thu May 02 19:40:28 2024
hashcat -b
hashcat (v6.2.6) starting in benchmark mode
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
OpenCL API (OpenCL 3.0 PoCL 5.0+debian Linux, None+Asserts, RELOC, SPIR, LLVM 16.0.6, SLEEF, DISTRO, POCL_DEBUG) - Platform #1 [The pocl project]
==================================================================================================================================================
* Device #1: cpu-sandybridge-Intel(R) Core(TM) i5-8300H CPU @ 2.30GHz, 1085/2235 MB (512 MB allocatable), 4MCU
Benchmark relevant options:
===========================
* --optimized-kernel-enable
-------------------
* Hash-Mode 0 (MD5)
-------------------
Speed.#1.........: 224.8 MH/s (4.43ms) @ Accel:256 Loops:1024 Thr:1 Vec:8
----------------------
* Hash-Mode 100 (SHA1)
----------------------
Speed.#1.........: 127.2 MH/s (7.81ms) @ Accel:256 Loops:1024 Thr:1 Vec:8
---------------------------
* Hash-Mode 1400 (SHA2-256)
---------------------------
Speed.#1.........: 52024.3 kH/s (20.16ms) @ Accel:256 Loops:1024 Thr:1 Vec:8
---------------------------
* Hash-Mode 1700 (SHA2-512)
---------------------------
Speed.#1.........: 15772.8 kH/s (8.14ms) @ Accel:256 Loops:128 Thr:1 Vec:4
-------------------------------------------------------------
* Hash-Mode 22000 (WPA-PBKDF2-PMKID+EAPOL) [Iterations: 4095]
-------------------------------------------------------------
Speed.#1.........: 4950 H/s (41.44ms) @ Accel:256 Loops:1024 Thr:1 Vec:8
-----------------------
* Hash-Mode 1000 (NTLM)
-----------------------
Speed.#1.........: 332.7 MH/s (2.90ms) @ Accel:256 Loops:1024 Thr:1 Vec:8
---------------------
* Hash-Mode 3000 (LM)
---------------------
Speed.#1.........: 95105.1 kH/s (10.37ms) @ Accel:256 Loops:1024 Thr:1 Vec:8
--------------------------------------------
* Hash-Mode 5500 (NetNTLMv1 / NetNTLMv1+ESS)
--------------------------------------------
Speed.#1.........: 233.1 MH/s (4.23ms) @ Accel:256 Loops:1024 Thr:1 Vec:8
----------------------------
* Hash-Mode 5600 (NetNTLMv2)
----------------------------
Speed.#1.........: 20566.1 kH/s (50.72ms) @ Accel:256 Loops:1024 Thr:1 Vec:8
--------------------------------------------------------
* Hash-Mode 1500 (descrypt, DES (Unix), Traditional DES)
--------------------------------------------------------
Speed.#1.........: 3996.8 kH/s (60.51ms) @ Accel:64 Loops:1024 Thr:1 Vec:8
------------------------------------------------------------------------------
* Hash-Mode 500 (md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)) [Iterations: 1000]
------------------------------------------------------------------------------
Speed.#1.........: 27786 H/s (35.99ms) @ Accel:256 Loops:1000 Thr:1 Vec:8
----------------------------------------------------------------
* Hash-Mode 3200 (bcrypt $2*$, Blowfish (Unix)) [Iterations: 32]
----------------------------------------------------------------
Speed.#1.........: 69 H/s (9.11ms) @ Accel:4 Loops:32 Thr:1 Vec:1
--------------------------------------------------------------------
* Hash-Mode 1800 (sha512crypt $6$, SHA512 (Unix)) [Iterations: 5000]
--------------------------------------------------------------------
Speed.#1.........: 2173 H/s (23.17ms) @ Accel:256 Loops:1024 Thr:1 Vec:4
--------------------------------------------------------
* Hash-Mode 7500 (Kerberos 5, etype 23, AS-REQ Pre-Auth)
--------------------------------------------------------
Speed.#1.........: 2518.9 kH/s (51.76ms) @ Accel:32 Loops:1024 Thr:1 Vec:8
-------------------------------------------------
* Hash-Mode 13100 (Kerberos 5, etype 23, TGS-REP)
-------------------------------------------------
Speed.#1.........: 2038.8 kH/s (63.41ms) @ Accel:64 Loops:512 Thr:1 Vec:8
---------------------------------------------------------------------------------
* Hash-Mode 15300 (DPAPI masterkey file v1 (context 1 and 2)) [Iterations: 23999]
---------------------------------------------------------------------------------
Speed.#1.........: 965 H/s (43.94ms) @ Accel:256 Loops:1024 Thr:1 Vec:8
---------------------------------------------------------------------------------
* Hash-Mode 15900 (DPAPI masterkey file v2 (context 1 and 2)) [Iterations: 12899]
---------------------------------------------------------------------------------
Speed.#1.........: 572 H/s (68.49ms) @ Accel:128 Loops:1024 Thr:1 Vec:4
------------------------------------------------------------------
* Hash-Mode 7100 (macOS v10.8+ (PBKDF2-SHA512)) [Iterations: 1023]
------------------------------------------------------------------
Speed.#1.........: 6975 H/s (48.26ms) @ Accel:256 Loops:511 Thr:1 Vec:4
---------------------------------------------
* Hash-Mode 11600 (7-Zip) [Iterations: 16384]
---------------------------------------------
Speed.#1.........: 2699 H/s (94.44ms) @ Accel:256 Loops:4096 Thr:1 Vec:8
------------------------------------------------
* Hash-Mode 12500 (RAR3-hp) [Iterations: 262144]
------------------------------------------------
Speed.#1.........: 337 H/s (94.81ms) @ Accel:128 Loops:16384 Thr:1 Vec:8
--------------------------------------------
* Hash-Mode 13000 (RAR5) [Iterations: 32799]
--------------------------------------------
Speed.#1.........: 688 H/s (44.94ms) @ Accel:256 Loops:1024 Thr:1 Vec:8
--------------------------------------------------------------------------------
* Hash-Mode 6211 (TrueCrypt RIPEMD160 + XTS 512 bit (legacy)) [Iterations: 1999]
--------------------------------------------------------------------------------
Speed.#1.........: 4326 H/s (58.61ms) @ Accel:256 Loops:512 Thr:1 Vec:8
-----------------------------------------------------------------------------------
* Hash-Mode 13400 (KeePass 1 (AES/Twofish) and KeePass 2 (AES)) [Iterations: 24569]
-----------------------------------------------------------------------------------
Speed.#1.........: 1068 H/s (39.78ms) @ Accel:256 Loops:1024 Thr:1 Vec:8
----------------------------------------------------------------
* Hash-Mode 6800 (LastPass + LastPass sniffed) [Iterations: 499]
----------------------------------------------------------------
Speed.#1.........: 45574 H/s (20.90ms) @ Accel:256 Loops:499 Thr:1 Vec:8
--------------------------------------------------------------------
* Hash-Mode 11300 (Bitcoin/Litecoin wallet.dat) [Iterations: 200459]
--------------------------------------------------------------------
Speed.#1.........: 70 H/s (74.11ms) @ Accel:256 Loops:1024 Thr:1 Vec:4
Started: Thu May 2 19:57:53 2024
Stopped: Thu May 2 20:09:16 2024
Známe útoky, které nejspíš byly provedeny pomocí nástroje Hashcat
Mall.cz
V období od 27. července do 25. srpna 2017 došlo k úniků osobních údajů (jméno, příjmení, e-mailová adresa, heslo, případně telefonní číslo) z domény Mall.cz. Tato hesla byla poté dostupná v plaintextu na serveru Ulož.to. Poškozených bylo nejméně 735 tisíc uživatelů. Teoretickým důvodem prolomení hesel bylo použití hashovacího algoritmu MD5 do roku 2012 a poté přechod na algoritmus SHA1. Společnost začala od října 2016 používat algoritmus bcrypt. Úřad pro ochranu osobních údajů ohodnotil únik dat pokutou 1,5 milionu Kč.
V roce 2012 došlo k několika únikům přihlašovacích údajů z platfomy LinekdIn. Celkový počet uniklých účtů v roce 2012 se odhaduje na 117 milionů účtů. Z těchto účtů unikly informace o e-mailové adrese a hesel, které byly zašifrované v algoritmu SHA1 bez použití Saltu.
Adobe
Od 11. do 17. září došlo k útoku do interní sítě společnosti Adobe, kde byly ukradeny informace o nejméně 38 milionech užvatelích Adobe. Byly odcizeny informace o e-mailové adrese, hesel a detailech o kreditních kartách. Hesla nebyly zahashovány, ale byly zašifrovány pomocí šifry 3DES.
Yahoo
V letech 2013 a 2014 byla společnost Yahoo vystavena dvěma největším únikům dat v historii. Společnost zveřejnila informace o těchto útocích až v září 2016. Únik v srpnu 2013 se týkal všech 3 miliard uživatelských účtů na platformě. V prosinci 2014 bylo ukradeno přes 500 milionů uživatelských účtů. Při prvním útoku nebyl nalezen použitý typ zabezpečení ani algoritmus hesla, ovšem při druhém byla většina hesel zašifrována pomocí algoritmu bcrypt a zbytek pomocí algoritmu MD5.
Budoucnost Rainbow Tables
V minulosti byly Rainbow tables populární metodou pro rychlé lámání hesel. V současné době již mají několik omezení a jsou méně účinné.
- Prvním příkladem je zvýšená délka hesel, kdy uživatelé používají delší a komplexnější hesla, kdy na tak dlouhá a složitá hesla je vytvořit obrovské tabulky pro pokrytí všech možných kombinací. To rovněž zabírá velké množství místa.
- Druhým příkladem je použití Saltu, které po přidání k původním heslům vytváří hash, který neodpovídá samotnému heslu.
- Třetím příkladem je vývoj nových hashovacích algoritmů, kdy jsou novější hashovací algoritmy odolnější právě proti Rainbow Tables.
- Čtvrtým příkladem jsou alternativní metody lámání hesel, kdy jsou útoky s maskou, brute-force útoky, či útoky spojené se sociálním inženýrstvím efektivnější, než Rainbow Tables. Útoky s maskou a brute-force útoky jsou s dnešním pokročilým výpočetním výkonem snažší a rychlejší, než Rainbow Tables.
Zdroje:
[1] How to Crack Hashes with Hashcat — a Practical Pentesting Guide. FreeCodeCamp [online]. [cit. 2024-04-01]. Dostupné z: https://www.freecodecamp.org/news/hacking-with-hashcat-a-practical-guide/
[2] Prolamování hesel pomocí nástroje Hashcat [online]. HACKINGLAB. [cit. 2024-04-01]. Dostupné z: https://hackinglab.cz/cs/blog/prolamovani-hesel-pomoci-nastroje-hashcat/
[3] What is a Rainbow Table Attack? How To Protect Against It? [online]. 1Kosmos. [cit. 2024-05-06]. Dostupné z: https://www.1kosmos.com/authentication/rainbow-table-attack/
[4] Understanding Rainbow Table Attack [online]. GeeksforGeeks. [cit. 2024-05-06]. Dostupné z: https://www.geeksforgeeks.org/understanding-rainbow-table-attack/
[5] Rainbow table. Online. In: Wikipedia: the free encyclopedia. San Francisco (CA): Wikimedia Foundation, 2001-. Dostupné z: https://en.wikipedia.org/wiki/Rainbow_table. [cit. 2024-05-06].
[6] hashcat | Kali Linux Tools [online]. Kali. [cit. 2024-05-06]. Dostupné z: https://www.kali.org/tools/hashcat/
[7] How to Use Hashcat for Password Cracking (2024 Guide) [online]. StationX. [cit. 2024-05-06]. Dostupné z: https://www.stationx.net/how-to-use-hashcat/
[8] MD5. Online. In: Wikipedia: the free encyclopedia. San Francisco (CA): Wikimedia Foundation, 2001-. Dostupné z: https://en.wikipedia.org/wiki/MD5. [cit. 2024-05-06].
[9] SHA-1. Online. In: Wikipedia: the free encyclopedia. San Francisco (CA): Wikimedia Foundation, 2001-. Dostupné z: https://en.wikipedia.org/wiki/SHA-1. [cit. 2024-05-06].
[10] SHA-2. Online. In: Wikipedia: the free encyclopedia. San Francisco (CA): Wikimedia Foundation, 2001-. Dostupné z: https://en.wikipedia.org/wiki/SHA-2. [cit. 2024-05-06].
[11] BLAKE (hash function). Online. In: Wikipedia: the free encyclopedia. San Francisco (CA): Wikimedia Foundation, 2001-. Dostupné z: https://en.wikipedia.org/wiki/BLAKE_(hash_function). [cit. 2024-05-06].
[12] Salt (cryptography). Online. In: Wikipedia: the free encyclopedia. San Francisco (CA): Wikimedia Foundation, 2001-. Dostupné z: https://en.wikipedia.org/wiki/Salt_(cryptography). [cit. 2024-05-06].
[13] Adding Salt to Hashing: A Better Way to Store Passwords [online]. Auth0 Blog. [cit. 2024-05-06]. Dostupné z: https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-passwords/
[14] What is Salted Password Hashing? [online]. GeeksforGeeks. [cit. 2024-05-06]. Dostupné z: https://www.geeksforgeeks.org/what-is-salted-password-hashing/
[15] V úniku z Mallu je přes tři čtvrtě milionu jmen, hesel a telefonních čísel v čitelné podobě [online]. Lupa.cz. [cit. 2024-05-05]. Dostupné z: https://www.lupa.cz/clanky/v-uniku-z-mallu-je-pres-tri-ctvrte-milionu-jmen-hesel-a-telefonnich-cisel-v-citelne-podobe/
[16] Mall.cz dostal za obří únik dat svých uživatelů pokutu 1,5 milionu Kč [online]. Lupa.cz. [cit. 2024-05-05]. Dostupné z: https://www.lupa.cz/aktuality/mall-cz-dostal-za-obri-unik-dat-svych-uzivatelu-pokutu-1-5-milionu-kc
[17] Gigantický únik dat z Mall.cz [online]. KYBEZ. [cit. 2024-05-05]. Dostupné z: https://kybez.cz/giganticky-unik-dat-z-mall-cz/
[18] Na prodej je 117 milionů hesel z LinkedIn, za 2 200 dolarů [online]. Lupa.cz. [cit. 2024-05-05]. Dostupné z: https://www.lupa.cz/clanky/na-prodej-je-117-mlionu-hesel-z-linkedin-za-2-200-dolaru/
[19] Nejčastější hesla 130 milionů uživatelů Adobe? 12346 i password [online]. Živě.cz. [cit. 2024-05-05]. Dostupné z: https://www.zive.cz/bleskovky/nejcastejsi-hesla-130-milionu-uzivatelu-adobe-12346-i-password/sc-4-a-171170/default.aspx
[20] Adobe napadeno: Hacker získal tři miliony účtů uživatelů i zdrojové kódy [online]. Živě.cz. [cit. 2024-05-05]. Dostupné z: https://www.zive.cz/bleskovky/adobe-napadeno-hacker-ziskal-tri-miliony-uctu-uzivatelu-i-zdrojove-kody/sc-4-a-170810/default.aspx
[21] 2012 LinkedIn hack. Online. In: Wikipedia: the free encyclopedia. San Francisco (CA): Wikimedia Foundation, 2001-. Dostupné z: https://en.wikipedia.org/wiki/2012_LinkedIn_hack. [cit. 2024-05-05].
[22] Yahoo! data breaches. Online. In: Wikipedia: the free encyclopedia. San Francisco (CA): Wikimedia Foundation, 2001-. Dostupné z: https://en.wikipedia.org/wiki/Yahoo!_data_breaches. [cit. 2024-05-05].