Because the cracking speed of the general password cracking tool is too slow, and the supported password cracking protocol is not much, brute-force cracking, some passwords can not be broken in 1 year, if you use the dictionary to run, you must have a plaintext password in the dictionary, and the password dictionary is too large, it is also a waste of time, and it is also a very common thing to not run out, the following recommends a tool with the fastest password cracking speed in the world, hashcat, hashcat github address, select the latest version of the download.
GPU
CPU
APU
DSP
FPGA
Coprocessor
Go to the official website of NVIDA to download the graphics card driver corresponding to the graphics card model of your computer as shown in the figure, and then install it step by step according to the prompts.
Once the installation is complete, restart your computer.
(NAVIDA'S GRAPHICS CARD ONLY NEEDS TO INSTALL THE OFFICIAL DRIVER, AND IT ALREADY CONTAINS THE GPU COMPUTING TOOLS NEEDED TO CRACK THE PASSWORD WITH HASHCAT.) Remember to use the graphics card driver officially downloaded in the picture above, and do not use the graphics card driver that comes with Windows. )
1 hashcat64.exe -b
Benchmark hashcat to crack various password hashes.
Check the settings: If the GPU is installed correctly, you will be able to see it and list its properties and the driver information used.
ordinary
1 -m, —hash-type=NUM 哈希類(lèi)別,其N(xiāo)UM值參考其幫助信息下面的哈希類(lèi)別值,其值為數(shù)字。如果不指定m值則默認(rèn)指md5,例如-m 1800是sha512 Linux加密。 2 3 -a, –attack-mode=NUM 攻擊模式,其值參考后面對(duì)參數(shù)?!?a 0”字典攻擊,“-a 1” 組合攻擊;“-a 3”掩碼攻擊。 4 5 -V, —version 版本信息 6 7 -h, –help 幫助信息。 8 9 –quiet 安靜的模式, 抑制輸出
Benchmarking
1 -b, –benchmark 測(cè)試計(jì)算機(jī)破解速度和顯示硬件相關(guān)信息
Miscellaneous
1 –hex-salt salt值是用十六進(jìn)制給出的 2 3 –hex-charset 設(shè)定字符集是十六進(jìn)制給出 4 5 –runtime=NUM 運(yùn)行數(shù)秒(NUM值)后的中止會(huì)話(huà) 6 7 –status 啟用狀態(tài)屏幕的自動(dòng)更新 8 9 –status-timer=NUM 狀態(tài)屏幕更新秒值 10 11 –status-automat 以機(jī)器可讀的格式顯示狀態(tài)視圖 12 13 –session 后跟會(huì)話(huà)名稱(chēng),主要用于中止任務(wù)后的恢復(fù)破解。
file
1 -o, –outfile=FILE 定義哈希文件恢復(fù)輸出文件 2 3 –outfile-format=NUM 定義哈希文件輸出格式,見(jiàn)下面的參考資料 4 5 –outfile-autohex-disable 禁止使用十六進(jìn)制輸出明文 6 7 -p, –separator=CHAR 為哈希列表/輸出文件定義分隔符字符 8 9 –show 僅僅顯示已經(jīng)破解的密碼 10 11 –left 僅僅顯示未破解的密碼 12 13 –username 忽略hash表中的用戶(hù)名,對(duì)linux文件直接進(jìn)行破解,不需要進(jìn)行整理。 14 15 –remove 移除破解成功的hash,當(dāng)hash是從文本中讀取時(shí)有用,避免自己手工移除已經(jīng)破解的hash 16 17 –stdout 控制臺(tái)模式 18 19 –potfile-disable 不寫(xiě)入pot文件 20 21 –debug-mode=NUM 定義調(diào)試模式(僅通過(guò)使用規(guī)則進(jìn)行混合),參見(jiàn)下面的參考資料 22 23 –debug-file=FILE 調(diào)試規(guī)則的輸出文件(請(qǐng)參閱調(diào)試模式) 24 25 -e, –salt-file=FILE 定義加鹽文件列表 26 27 –logfile-disable 禁止logfile
resource
1 -c, –segment-size=NUM 字典文件緩存大小(M) 2 3 -n, –threads=NUM 線(xiàn)程數(shù) 4 5 -s, –words-skip=NUM 跳過(guò)單詞數(shù) 6 7 -l, –words-limit=NUM 限制單詞數(shù)(分布式)
rules
1 -r, –rules-file=FILE 使用規(guī)則文件: -r 1.rule, 2 3 -g, –generate-rules=NUM 隨機(jī)生成規(guī)則 4 5 –generate-rules-func-min= 每個(gè)隨機(jī)規(guī)則最小值 6 7 –generate-rules-func-max=每個(gè)隨機(jī)規(guī)則最大值 8 9 –generate-rules-seed=NUM 強(qiáng)制RNG種子數(shù)
Custom character sets
1 -1, –custom-charset1=CS 用戶(hù)定義的字符集 2 3 -2, –custom-charset2=CS 例如: 4 5 -3, –custom-charset3=CS –custom-charset1=?dabcdef : 設(shè)置?1 為0123456789abcdef 6 7 -4, –custom-charset4=CS -2mycharset.hcchr : 設(shè)置 ?2 包含在mycharset.hcchr
Attack patterns
1 –toggle-min=NUM 在字典中字母的最小值 2 3 –toggle-max=NUM 在字典中字母的最大值 4 5 –increment 使用增強(qiáng)模式 6 7 –increment-min=NUM 增強(qiáng)模式開(kāi)始值 8 9 –increment-max=NUM 增強(qiáng)模式結(jié)束值 10 11 –perm-min=NUM 過(guò)濾比NUM數(shù)小的單詞 12 13 –perm-max=NUM 過(guò)濾比NUM數(shù)大的單詞 14 15 -t, –table-file=FILE 表文件 16 17 –table-min=NUM 在字典中的最小字符值 18 19 –table-max=NUM 在字典中的最大字符值 20 21 –pw-min=NUM 如果長(zhǎng)度大于NUM,則打印候選字符 22 23 –pw-max=NUM 如果長(zhǎng)度小于NUM,則打印候選字符 24 25 –elem-cnt-min=NUM 每個(gè)鏈的最小元素?cái)?shù) 26 27 –elem-cnt-max=NUM 每個(gè)鏈的最大元素?cái)?shù) 28 29 –wl-dist-len 從字典表中計(jì)算輸出長(zhǎng)度分布 30 31 –wl-max=NUM 從字典文件中加載NUM個(gè)單詞,設(shè)置0禁止加載。 32 33 –case-permute 在字典中對(duì)每一個(gè)單詞進(jìn)行反轉(zhuǎn)
reference
1 = hash[:salt] 2 = plain 明文 3 = hash[:salt]:plain 4 = hex_plain 5 = hash[:salt]:hex_plain 6 = plain:hex_plain 7 = hash[:salt]:plain:hex_plain 8 = crackpos 9 = hash[:salt]:crackpos 10 = plain:crackpos 11 = hash[:salt]:plain:crackpos 12 = hex_plain:crackpos 13 = hash[:salt]:hex_plain:crackpos 14 = plain:hex_plain:crackpos 15 = hash[:salt]:plain:hex_plain:crackpos
調(diào)試模式輸出文件 (for hybrid mode only, by using rules):
1 = save finding rule 2 = save original word 3 = save original word and finding rule 4 = save original word, finding rule andmodified plain
內(nèi)置的字符集:
1 ?l = abcdefghijklmnopqrstuvwxyz 代表小寫(xiě)字母 2 3 ?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ 代表大寫(xiě)字母 4 5 ?d = 0123456789 代表數(shù)字 6 7 ?s = !”#$%&’()*+,-./:;<=>?@[\]^_`{|}~ 代表特殊字符 8 9 ?a = ?l?u?d?s 大小寫(xiě)數(shù)字及特殊字符的組合 10 11 ?b = 0×00 – 0xff
攻擊模式
1 0 = Straight (字典破解) 2 3 1 = Combination (組合破解) 4 5 2 = Toggle-Case (大小寫(xiě)轉(zhuǎn)換) 6 7 3 = Brute-force(掩碼暴力破解) 8 9 4 = Permutation(序列破解) 10 11 5 = Table-Lookup(查表破解) 12 13 6 = Hybrid dict + mask 字典加掩碼破解 14 15 7 = Hybrid mask + dict 掩碼+字典破解 16 17 8 = Prince(王子破解)
For an example of hash types
, please refer to the URL
1 0 = MD5 2 3 10 = md5($pass.$salt) 4 5 20 = md5($salt.$pass) 6 7 30 = md5(unicode($pass).$salt) 8 9 40 = md5($salt.unicode($pass)) 10 11 50 = HMAC-MD5 (key = $pass) 12 13 60 = HMAC-MD5 (key = $salt) 14 15 100 = SHA1 16 17 110 = sha1($pass.$salt) 18 19 120 = sha1($salt.$pass) 20 21 130 = sha1(unicode($pass).$salt) 22 23 140 = sha1($salt.unicode($pass)) 24 25 150 = HMAC-SHA1 (key = $pass) 26 27 160 = HMAC-SHA1 (key = $salt) 28 29 200 = MySQL323 30 31 300 = MySQL4.1/MySQL5 32 33 400 = phpass, MD5(WordPress), MD5(phpBB3),MD5(Joomla) 34 35 500 = md5crypt, MD5(Unix), FreeBSD MD5,Cisco-IOS MD5 36 37 900 = MD4 38 39 1000 = NTLM 40 41 1100 = Domain Cached Credentials (DCC), MSCache 42 43 1400 = SHA256 44 45 1410 = sha256($pass.$salt) 46 47 1420 = sha256($salt.$pass) 48 49 1430 = sha256(unicode($pass).$salt) 50 51 1431 = base64(sha256(unicode($pass))) 52 53 1440 = sha256($salt.unicode($pass)) 54 55 1450 = HMAC-SHA256 (key = $pass) 56 57 1460 = HMAC-SHA256 (key = $salt) 58 59 1600 = md5apr1, MD5(APR), Apache MD5 60 61 1700 = SHA512 62 63 1710 = sha512($pass.$salt) 64 65 1720 = sha512($salt.$pass) 66 67 1730 = sha512(unicode($pass).$salt) 68 69 1740 = sha512($salt.unicode($pass)) 70 71 1750 = HMAC-SHA512 (key = $pass) 72 73 1760 = HMAC-SHA512 (key = $salt) 74 75 1800 = SHA-512(Unix) 76 77 2400 = Cisco-PIX MD5 78 79 2410 = Cisco-ASA MD5 80 81 2500 = WPA/WPA2 82 83 2600 = Double MD5 84 85 3200 = bcrypt, Blowfish(OpenBSD) 86 87 3300 = MD5(Sun) 88 89 3500 = md5(md5(md5($pass))) 90 91 3610 = md5(md5($salt).$pass) 92 93 3710 = md5($salt.md5($pass)) 94 95 3720 = md5($pass.md5($salt)) 96 97 3800 = md5($salt.$pass.$salt) 98 99 3910 = md5(md5($pass).md5($salt)) 100 101 4010 = md5($salt.md5($salt.$pass)) 102 103 4110 = md5($salt.md5($pass.$salt)) 104 105 4210 = md5($username.0.$pass) 106 107 4300 = md5(strtoupper(md5($pass))) 108 109 4400 = md5(sha1($pass)) 110 111 4500 = Double SHA1 112 113 4600 = sha1(sha1(sha1($pass))) 114 115 4700 = sha1(md5($pass)) 116 117 4800 = MD5(Chap), iSCSI CHAP authentication 118 119 4900 = sha1($salt.$pass.$salt) 120 121 5000 = SHA-3(Keccak) 122 123 5100 = Half MD5 124 125 5200 = Password Safe SHA-256 126 127 5300 = IKE-PSK MD5 128 129 5400 = IKE-PSK SHA1 130 131 5500 = NetNTLMv1-VANILLA / NetNTLMv1-ESS 132 133 5600 = NetNTLMv2 134 135 5700 = Cisco-IOS SHA256 136 137 5800 = Android PIN 138 139 6300 = AIX {smd5} 140 141 6400 = AIX {ssha256} 142 143 6500 = AIX {ssha512} 144 145 6700 = AIX {ssha1} 146 147 6900 = GOST, GOST R 34.11-94 148 149 7000 = Fortigate (FortiOS) 150 151 7100 = OS X v10.8+ 152 153 7200 = GRUB 2 154 155 7300 = IPMI2 RAKP HMAC-SHA1 156 157 7400 = sha256crypt, SHA256(Unix) 158 159 7900 = Drupal7 160 161 8400 = WBB3, Woltlab Burning Board 3 162 163 8900 = scrypt 164 165 9200 = Cisco $8$ 166 167 9300 = Cisco $9$ 168 169 9800 = Radmin2 170 171 10000 = Django (PBKDF2-SHA256) 172 173 10200 = Cram MD5 174 175 10300 = SAP CODVN H (PWDSALTEDHASH) iSSHA-1 176 177 11000 = PrestaShop 178 179 11100 = PostgreSQL Challenge-ResponseAuthentication (MD5) 180 181 11200 = MySQL Challenge-Response Authentication(SHA1) 182 183 11400 = SIP digest authentication (MD5) 184 185 99999 = Plaintext
Special hash type
1 11 = Joomla < 2.5.18 2 3 12 = PostgreSQL 4 5 21 = osCommerce, xt:Commerce 6 7 23 = Skype 8 9 101 = nsldap, SHA-1(Base64), Netscape LDAPSHA 10 11 111 = nsldaps, SSHA-1(Base64), Netscape LDAPSSHA 12 13 112 = Oracle S: Type (Oracle 11+) 14 15 121 = SMF > v1.1 16 17 122 = OS X v10.4, v10.5, v10.6 18 19 123 = EPi 20 21 124 = Django (SHA-1) 22 23 131 = MSSQL(2000) 24 25 132 = MSSQL(2005) 26 27 133 = PeopleSoft 28 29 141 = EPiServer 6.x < v4 30 31 1421 = hMailServer 32 33 1441 = EPiServer 6.x > v4 34 35 1711 = SSHA-512(Base64), LDAP {SSHA512} 36 37 1722 = OS X v10.7 38 39 1731 = MSSQL(2012 & 2014) 40 41 2611 = vBulletin < v3.8.5 42 43 2612 = PHPS 44 45 2711 = vBulletin > v3.8.5 46 47 2811 = IPB2+, MyBB1.2+ 48 49 3711 = Mediawiki B type 50 51 3721 = WebEdition CMS 52 53 7600 = Redmine Project Management Web App
Step 4: Hashcat Password Cracking Rule Example
1 (1)字典攻擊 2 3 -a 0 password.lst 4 (2)1到8為數(shù)字掩碼攻擊 5 6 -a 3 --increment --increment-min 1--increment-max 8 ?d?d?d?d?d?d?d?d –O 7 ?d代表數(shù)字,可以換成小寫(xiě)字母?l,大寫(xiě)字母?u,特殊字符?s,大小寫(xiě)字母+特殊字符?a,–O表示最優(yōu)化破解模式,可以加該參數(shù),也可以不加該參數(shù)。 8 9 (3)8為數(shù)字攻擊 10 11 -a 3 ?d?d?d?d?d?d?d?d 12 同理可以根據(jù)位數(shù)設(shè)置為字母大寫(xiě)、小寫(xiě)、特殊字符等模式。 13 14 (4)自定義字符 15 現(xiàn)在純數(shù)字或者純字母的密碼是比較少見(jiàn)的,根據(jù)密碼專(zhuān)家對(duì)泄漏密碼的分析,90%的個(gè)人密碼是字母和數(shù)字的組合,可以是自定義字符了來(lái)進(jìn)行暴力破解,Hashcat支持4個(gè)自定義字符集,分別是 -1 -2 -3 -4。定義時(shí)只需要這樣-2 ?l?d ,然后就可以在后面指定?2,?2表示小寫(xiě)字母和數(shù)字。這時(shí)候要破解一個(gè)8位混合的小寫(xiě)字母加數(shù)字: 16 17 Hashcat.exe -a 3 –force -2 ?l?d hassh值或者h(yuǎn)ash文件 ?2?2?2?2?2?2?2?2 18 例如破解dz小寫(xiě)字母+數(shù)字混合8位密碼破解: 19 20 Hashcat -m 2611 -a 3 -2 ?l?d dz.hash ?2?2?2?2?2?2?2?2 21 (5)字典+掩碼暴力破解 22 Hashcat還支持一種字典加暴力的破解方法,就是在字典前后再加上暴力的字符序列,比如在字典后面加上3為數(shù)字,這種密碼是很常見(jiàn)的。使用第六種攻擊模式: 23 24 a-6 (Hybrid dict + mask) 25 如果是在字典前面加則使用第7中攻擊模式也即( a-7 = Hybridmask + dict),下面對(duì)字典文件加數(shù)字123進(jìn)行破解: 26 27 H.exe -a 6 ffe1cb31eb084cd7a8dd1228c23617c8 password.lst ?d?d?d 28 假如ffe1cb31eb084cd7a8dd1228c23617c8的密碼為password123,則只要password.lst包含123即可 29 30 (6)掩碼+字典暴力破解 31 32 H.exe -a 7 ffe1cb31eb084cd7a8dd1228c23617c8 password.lst ?d?d?d 33 假如ffe1cb31eb084cd7a8dd1228c23617c8的密碼為123password,則只要password.lst包含password即可。 34 35 (7)大小寫(xiě)轉(zhuǎn)換攻擊,對(duì)password.lst中的單詞進(jìn)行大小寫(xiě)轉(zhuǎn)換攻擊 36 37 H.exe-a 2 ffe1cb31eb084cd7a8dd1228c23617c8 password.lst 38 EXAMPLES 39 (1)8位數(shù)字破解 40 41 Hashcat64-m 9700 hash -a 3 ?d?d?d?d?d?d?d?d -w 3 –O 42 (2)1-8位數(shù)字破解 43 44 Hashcat-m 9700 hash -a 3 --increment --increment-min 1--increment-max 8 ?d?d?d?d?d?d?d?d 45 (3)1到8位小寫(xiě)字母破解 46 47 Hashcat-m 9700 hash -a 3 --increment --increment-min 1--increment-max 8 ?l?l?l?l?l?l?l?l 48 (4)8位小寫(xiě)字母破解 49 50 Hashcat-m 9700 hash -a 3 ?l?l?l?l?l?l?l?l -w 3 –O 51 (5)1-8位大寫(xiě)字母破解 52 53 Hashcat-m 9700 hash -a 3 --increment --increment-min 1--increment-max 8 ?u?u?u?u?u?u?u?u 54 (6)8位大寫(xiě)字母破解 55 56 Hashcat-m 9700 hash -a 3 ?u?u?u?u?u?u?u?u -w 3 –O 57 (7)5位小寫(xiě)+ 大寫(xiě)+數(shù)字+特殊字符破解 58 59 Hashcat-m 9700 hash -a 3 ?b?b?b?b?b -w 3 60 (8)使用字典進(jìn)行破解 61 使用password.lst字典進(jìn)行暴力破解,-w 3參數(shù)是指定電力消耗 62 63 Hashcat -m 9700 -a 0 -w 3 hash password.lst 64 在執(zhí)行破解成功后,hashcat會(huì)自動(dòng)終止破解,并顯示破解狀態(tài)為Cracked,Recvoered中也會(huì)顯示是否破解成功. 65 66 破解known_hosts中的IP地址 67 經(jīng)過(guò)研究發(fā)現(xiàn)known_hosts中會(huì)對(duì)連接的IP地址進(jìn)行HMAC SHA1加密,可以通過(guò)hexhosts攻擊進(jìn)行轉(zhuǎn)換,然后通過(guò)hashcat進(jìn)行暴力破解,其密碼類(lèi)型為160(HMAC-SHA1 (key = $salt))。 68 69 (1)計(jì)算HMAC SHA1值 70 71 gitclone https://github.com/persona5/hexhosts.git 72 cdhexhosts 73 gcchexhosts.c -lresolv -w -o hexhosts 74 ./hexhosts 75 獲取known_hosts的HMAC SHA1加密值: 76 77 注意:known_hosts值一定要正確,可以將known_hosts文件復(fù)制到hexhosts文件目錄。 78 79 (2)組合攻擊暴力破解 80 81 hashcat-a 1 -m 160 known_hosts.hash ips_left.txt ips_right.txt --hex-salt 82 組合攻擊是將ips_left.txt和ips_right.txt進(jìn)行組合,形成完整的IP地址進(jìn)行暴力破解。 83 84 ips_left.txt和ips_right.txt文件可以用以下代碼進(jìn)行生成: 85 86 ip-gen.sh: 87 88 89 90 for a in `seq 0 255` 91 92 do 93 94 for b in `seq0 255` 95 96 do 97 98 echo"$a.$b." >> ips_left.txt 99 100 echo"$a.$b" >> ips_right.txt 101 102 done 103 104 done 105 (3)使用掩碼進(jìn)行攻擊 106 107 hashcat -a 3 -m 160 known_hosts.hash ipv4.hcmask--hex-salt 108 ipv4.hcmask文件內(nèi)容可在此站下載。 109 110 破解md5加密的IP地址 111 在CDN等網(wǎng)絡(luò)或者配置中往往會(huì)對(duì)IP地址進(jìn)行MD5加密,由于其位數(shù)3×4+3(xxx.xxx.xxx.xxx)=17位,通過(guò)正常的密碼破解其時(shí)間耗費(fèi)非常長(zhǎng),但通過(guò)分析其IP地址的規(guī)律,發(fā)現(xiàn)其地址XXX均為數(shù)字,因此可以通過(guò)hashcat的組合和掩碼進(jìn)行攻擊。 112 113 hashcat-a 1 –m 0 ip.md5.txt ips_left.txt ips_right.txt 114 115 hashcat -a1 -m 0 ip.md5.txt ipv4.hcmask 116 另外在F5的cookie中會(huì)對(duì)其IP地址進(jìn)行加密,可以參考的破解代碼如下: 117 118 import struct 119 120 cookie = "1005421066.20736.0000" 121 122 (ip,port,end)=cookie.split(".") 123 124 (a,b,c,d)=[ord(i) for i in struct.pack("i",int(ip))] 125 126 print "Decoded IP: %s %s %s %s" % (a,b,c,d) 127 128 Decoded IP: 10.130.237.59 129 破解技巧總結(jié) 130 在使用GPU模式進(jìn)行破解時(shí),可以使用-O參數(shù)自動(dòng)進(jìn)行優(yōu)化 131 132 暴力破解一條md5值 133 (1)9位數(shù)字破解 134 135 Hashcat64.exe-a 3 --force d98d28ca88f9966cb3aaefebbfc8196f ?d?d?d?d?d?d?d?d?d 136 單獨(dú)破解一條md5值需要加force參數(shù) 137 138 (2)9位字母破解 139 140 Hashcat64.exe-a 3 --force d98d28ca88f9966cb3aaefebbfc8196f ?l?l?l?l?l?l?l?l?l 141 破解帶鹽discuz密碼 142 (1)數(shù)字破解 143 7位數(shù)字,7秒時(shí)間破解完成任務(wù)。 144 145 Hashcat64.exe-a 3 --force -m 2611 ffe1cb31eb084cd7a8dd1228c23617c8:f56463 ?d?d?d?d?d?d?d 146 8位數(shù)字破解,9秒時(shí)間破解完成任務(wù)。: 147 148 Hashcat64.exe-a 3 --force -m 2611 ffe1cb31eb084cd7a8dd1228c23617c8:f56463 ?d?d?d?d?d?d?d?d 149 9位數(shù)字破解,9秒時(shí)間破解完成任務(wù)。 150 151 Hashcat64.exe-a 3 --force -m 2611 ffe1cb31eb084cd7a8dd1228c23617c8:f56463 ?d?d?d?d?d?d?d?d?d 152 字母破解 153 (1)6位小寫(xiě)字母 154 155 Hashcat64.exe-a 3 --force -m 2611 ffe1cb31eb084cd7a8dd1228c23617c8:f56463 ?l?l?l?l?l?l 156 (2)7位小寫(xiě)字母 157 158 Hashcat64.exe-a 3 --force -m 2611 ffe1cb31eb084cd7a8dd1228c23617c8:f56463 ?l?l?l?l?l?l?l 159 (3)8位小寫(xiě)字母 160 161 Hashcat64.exe-a 3 --force -m 2611 ffe1cb31eb084cd7a8dd1228c23617c8:f56463 ?l?l?l?l?l?l?l?l 9分鐘左右完成破解任務(wù) 162 (4)9位小寫(xiě)字母 163 164 Hashcat64.exe-a 3 --force -m 2611 ffe1cb31eb084cd7a8dd1228c23617c8:f56463 ?l?l?l?l?l?l?l?l?l -O 165 字母加數(shù)字 166 Hashcat64.exe-a 3 --force -m 2611 -2 ?d?l ffe1cb31eb084cd7a8dd1228c23617c8:f56463?2?2?2?2?2?2?2 167 (3)7位大寫(xiě)字母 168 169 Hashcat64.exe-a 3 –force –m 2611 ffe1cb31eb084cd7a8dd1228c23617c8:f56463 ?u?u?u?u?u?u?u 170 (4)6到8位數(shù)字破解 171 172 Hashcat64.exe-a 3 –force –m 2611 ffe1cb31eb084cd7a8dd1228c23617c8:f56463--increment --increment-min 6 --increment-max 8 ?l?l?l?l?l?l?l?l 173 自定義破解 174 (1)使用數(shù)字加字母混合6位進(jìn)行破解 175 176 Hashcat64.exe-a 3 --force -m 2611 -2 ?d?l ffe1cb31eb084cd7a8dd1228c23617c8:f56463?2?2?2?2?2?2 -O 177 (2)使用數(shù)字加字母混合7位進(jìn)行破解,破解時(shí)間4分16秒 178 179 Hashcat64.exe-a 3 --force -m 2611 -2 ?d?l ffe1cb31eb084cd7a8dd1228c23617c8:f56463?2?2?2?2?2?2?2 –O 180 (3)使用數(shù)字加字母混合8位進(jìn)行破解 181 182 Hashcat64.exe-a 3 --force -m 2611 -2 ?d?l ffe1cb31eb084cd7a8dd1228c23617c8:f56463?2?2?2?2?2?2?2?2 -O 183 字典破解模式 184 Hashcat64.exe-a 0 --force -m 2611 ffe1cb31eb084cd7a8dd1228c23617c8:f56463 password.lst 185 使用字典文件夾下的字典進(jìn)行破解: 186 187 Hashcat32.exe-m 300 mysqlhashes.txt –remove -o mysql-cracked.txt ..\dictionaries\* 188 會(huì)話(huà)保存及恢復(fù)破解 189 (1)使用mask文件規(guī)則來(lái)破解密碼 190 191 hashcat-m 2611 -a 3 --session mydz dz.hash masks/rockyou-7-2592000.hcmask 192 (2)恢復(fù)會(huì)話(huà) 193 194 hashcat--session mydz --restore 195 掩碼破解 196 mask規(guī)則文件位于masks下,例如D:\PentestBox\hashcat-4.1.0\masks,執(zhí)行破解設(shè)置為: 197 198 masks/8char-1l-1u-1d-1s-compliant.hcmask 199 masks/8char-1l-1u-1d-1s-noncompliant.hcmask 200 masks/rockyou-1-60.hcmask 201 masks/rockyou-2-1800.hcmask 202 masks/rockyou-3-3600.hcmask 203 masks/rockyou-4-43200.hcmask 204 masks/rockyou-5-86400.hcmask 205 masks/rockyou-6-864000.hcmask 206 masks/rockyou-7-2592000.hcmask 207 運(yùn)用規(guī)則文件進(jìn)行破解 208 209 Hashcat -m 300 mysqlhashes.txt–remove -o mysql-cracked.txt ..\dictionaries\* -r rules\best64.rule 210 211 hashcat -m 2611 -a 0 dz.hashpassword.lst -r rules\best64.rule -O 212 hashcat參數(shù)優(yōu)化 213 考慮到hashcat的破解速度以及資源的分配,我們可以對(duì)一些參數(shù)進(jìn)行配置 214 1.Workload tuning 負(fù)載調(diào)優(yōu)。 215 該參數(shù)支持的值有1,8,40,80,160 216 217 --gpu-accel 160 可以讓GPU發(fā)揮最大性能。 218 2.Gpu loops 負(fù)載微調(diào) 219 該參數(shù)支持的值的范圍是8-1024(有些算法只支持到1000)。 220 221 --gpu-loops 1024 可以讓GPU發(fā)揮最大性能。 222 3.Segment size 字典緩存大小 223 該參數(shù)是設(shè)置內(nèi)存緩存的大小,作用是將字典放入內(nèi)存緩存以加快字典破解速度,默認(rèn)為32MB,可以根據(jù)自身內(nèi)存情況進(jìn)行設(shè)置,當(dāng)然是越大越塊了。 224 225 --segment-size 512 可以提高大字典破解的速度。 226 LAST:密碼設(shè)置建議 227 使用更長(zhǎng)的字符串 228 使用更大的字符集字母、數(shù)字、符號(hào) 229 230 不要使用任何可能與你有關(guān)的字符作為密碼或密碼的一部分使用 231 232