You can generate your own hashes to crack: # echo -n "password" | openssl md5 > hash.txt
To crack SHA1 hashes using a wordlist:
# ./hashcat-cli.bin -a 0 -m 100 hashes.txt wordlist.lst //crack sha1 hashes in hashes.txt
To perform a bruteforce attack for the MD5 hash:
# ./hashcat-cli-bin -a 3 -m 0 --bf-pw-max=4 hash.txt //bruteforce the md5 hashes in hash.txt with a password length max of 4
# ./hashcat-cli.bin -h //for more help and options
Resources / Good Reading:
http://hashcat.net
No comments:
Post a Comment