-- Leo's gemini proxy
-- Connecting to freeshell.de:1965...
-- Connected
-- Sending request
-- Meta line: 20 text/gemini;lang=en-GB
> Fast and advanced password recovery tool.
Perform a brute-force attack (mode 3) with the default hashcat mask:
hashcat --hash-type {hash_type_id} --attack-mode {3} {hash_value}
Perform a brute-force attack (mode 3) with a known pattern of 4 digits:
hashcat --hash-type {hash_type_id} --attack-mode {3} {hash_value} "{?d?d?d?d}"
Perform a brute-force attack (mode 3) using at most 8 of all printable ASCII characters:
hashcat --hash-type {hash_type_id} --attack-mode {3} --increment {hash_value} "{?a?a?a?a?a?a?a?a}"
Perform a dictionary attack (mode 0) using the RockYou wordlist of a Kali Linux box:
hashcat --hash-type {hash_type_id} --attack-mode {0} {hash_value} {/usr/share/wordlists/rockyou.txt}
Perform a rule-based dictionary attack (mode 0) using the RockYou wordlist mutated with common password variations:
hashcat --hash-type {hash_type_id} --attack-mode {0} --rules-file {/usr/share/hashcat/rules/best64.rule} {hash_value} {/usr/share/wordlists/rockyou.txt}
Perform a combination attack (mode 1) using the concatenation of words from two different custom dictionaries:
hashcat --hash-type {hash_type_id} --attack-mode {1} {hash_value} {/path/to/dictionary1.txt} {/path/to/dictionary2.txt}
Show result of an already cracked hash:
hashcat --show {hash_value}
> Copyright © 2014—present the tldr-pages team and contributors.
> This work is licensed under the Creative Commons Attribution 4.0 International License (CC-BY).
-- Response ended
-- Page fetched on Fri May 17 18:22:12 2024