-- Leo's gemini proxy

-- Connecting to freeshell.de:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

hashcat


> Fast and advanced password recovery tool.

More information.


Perform a brute-force attack (mode 3) with the default hashcat mask:

hashcat --hash-type {hash_type_id} --attack-mode {3} {hash_value}

Perform a brute-force attack (mode 3) with a known pattern of 4 digits:

hashcat --hash-type {hash_type_id} --attack-mode {3} {hash_value} "{?d?d?d?d}"

Perform a brute-force attack (mode 3) using at most 8 of all printable ASCII characters:

hashcat --hash-type {hash_type_id} --attack-mode {3} --increment {hash_value} "{?a?a?a?a?a?a?a?a}"

Perform a dictionary attack (mode 0) using the RockYou wordlist of a Kali Linux box:

hashcat --hash-type {hash_type_id} --attack-mode {0} {hash_value} {/usr/share/wordlists/rockyou.txt}

Perform a rule-based dictionary attack (mode 0) using the RockYou wordlist mutated with common password variations:

hashcat --hash-type {hash_type_id} --attack-mode {0} --rules-file {/usr/share/hashcat/rules/best64.rule} {hash_value} {/usr/share/wordlists/rockyou.txt}

Perform a combination attack (mode 1) using the concatenation of words from two different custom dictionaries:

hashcat --hash-type {hash_type_id} --attack-mode {1} {hash_value} {/path/to/dictionary1.txt} {/path/to/dictionary2.txt}

Show result of an already cracked hash:

hashcat --show {hash_value}


> Copyright © 2014—present the tldr-pages team and contributors.

> This work is licensed under the Creative Commons Attribution 4.0 International License (CC-BY).

CC-BY



-- Response ended

-- Page fetched on Fri May 17 18:22:12 2024