hashcat常用于破解各种密码,mac上已经安装
语法基础
hashcat —help 可以查看所有参数
hashcat -m [] -a [] ""-a:0 Straight(字典破解)1 Combination(组合破解)3 Brute-force(掩码暴力破解)6 Hybrid dict + mask(混合字典+掩码)7 Hybrid mask + dict(混合掩码+字典)-m:900 = MD40 = MD55100 = Half MD5100 = SHA110800 = SHA-3841400 = SHA-2561700 = SHA-5125000 = SHA-3(Keccak)10100 = SipHash6000 = RipeMD1606100 = Whirlpool6900 = GOST R 34.11-9411700 = GOST R 34.11-2012 (Streebog) 256-bit11800 = GOST R 34.11-2012 (Streebog) 512-bit10 = md5($pass.$salt)20 = md5($salt.$pass)30 = md5(unicode($pass).$salt)40 = md5($salt.unicode($pass))3800 = md5($salt.$pass.$salt)3710 = md5($salt.md5($pass))2600 = md5(md5($pass)4300 = md5(strtoupper(md5($pass)))4400 = md5(sha1($pass))110 = sha1($pass.$salt)120 = sha1($salt.$pass)130 = sha1(unicode($pass).$salt)140 = sha1($salt.unicode($pass))4500 = sha1(sha1($pass)4700 = sha1(md5($pass))4900 = sha1($salt.$pass.$salt)1410 = sha256($pass.$salt)1420 = sha256($salt.$pass)1430 = sha256(unicode($pass).$salt)1440 = sha256($salt.unicode($pass))1710 = sha512($pass.$salt)1720 = sha512($salt.$pass)1730 = sha512(unicode($pass).$salt)1740 = sha512($salt.unicode($pass))
示例
md5
hashcat -m 0 -a 3 "8fb744b51a1f14e5e8cda4e4aec68e2f"# -m 0 :md5格式# -a 3 : 暴力破解# 后面可以追加密码文件
这短短的一生我们最终都会失去,不放大胆一点,爱一个人、攀一座山、追一个梦!
