banner
lca

lca

真正的不自由,是在自己的心中设下牢笼。

hashcat密碼破解工具基礎使用

前言#

hashcat是一款暴力破解、密碼恢復工具,被稱為 “世界上最快、最先進的密碼恢復實用程序”,Hashcat 可與John the Ripper一較高下。它是破解哈希的首選滲透測試工具,並且 hashcat 支持多種猜測密碼的蠻力攻擊,包括字典和掩碼攻擊。

以前在測試的中,遇到的大部分是 MD5 的 hash 值,一般通過線上的 MD5 破解網站進行破解,比較常用的是somd5chamd5,很少用密碼工具去破解 MD5 值,因為自己本身硬體速度跟不上,Hashcat 在現代 GPU 上運行最好,如果利用想 AWS 服務去破解密碼,速度其實是非常快的,相對於破解一個密碼的成本來說,硬體的支付成本並不會太高。

語法介紹#

常用參數#

  • -a:指定攻擊模式。“-a 0” 字典攻擊,“-a 1” 組合攻擊;“-a 3” 掩碼攻擊。
  • -m:指定 hash 類型,如果不指定類型,則默認是 MD5,例如:-m 1000
  • -o:指定破解成功後的 hash 及對應的明文密碼的存在位置
  • --force:忽略破解過程中的警告信息
  • --show:顯示已經破解的 hash 及該 hash 所對應的明文
  • -r:使用自定義破解規則
  • --increment :啟用增量破解模式,你可以利用此模式讓 hashcat 在指定的密碼長度範圍內執行破解過程
  • --increment-min 密碼最小長度,後面直接等於一個整數即可,配置 increment 模式一起使用
  • --increment-max 密碼最大長度,同上

OpenCL 設備類型#

| Device Type#

===+=============
1 | CPU
2 | GPU
3 | FPGA, DSP, Co-Processor

攻擊模式#

Attack Modes

輸出格式#

Outfile Formats

Hash ID 對照表

#名稱類別
900MD4Raw Hash
0MD5Raw Hash
100SHA1Raw Hash
1300SHA2-224Raw Hash
1400SHA2-256Raw Hash
10800SHA2-384Raw Hash
1700SHA2-512Raw Hash
17300SHA3-224Raw Hash
17400SHA3-256Raw Hash
17500SHA3-384Raw Hash
17600SHA3-512Raw Hash
6000RIPEMD-160Raw Hash
600BLAKE2b-512Raw Hash
11700GOST R 34.11-2012 (Streebog) 256-bit, big-endianRaw Hash
11800GOST R 34.11-2012 (Streebog) 512-bit, big-endianRaw Hash
6900GOST R 34.11-94Raw Hash
5100Half MD5Raw Hash
18700Java Object hashCode()Raw Hash
17700Keccak-224Raw Hash
17800Keccak-256Raw Hash
17900Keccak-384Raw Hash
18000Keccak-512Raw Hash
21400sha256(sha256_bin($pass))Raw Hash
6100WhirlpoolRaw Hash
10100SipHashRaw Hash
21000BitShares v0.x - sha512(sha512_bin(pass))Raw Hash
10md5($pass.$salt)Raw Hash, Salted and/or Iterated
20md5($salt.$pass)Raw Hash, Salted and/or Iterated
3800md5($salt.$pass.$salt)Raw Hash, Salted and/or Iterated
3710md5($salt.md5($pass))Raw Hash, Salted and/or Iterated
4110md5($salt.md5($pass.$salt))Raw Hash, Salted and/or Iterated
4010md5($salt.md5($salt.$pass))Raw Hash, Salted and/or Iterated
21300md5($salt.sha1($salt.$pass))Raw Hash, Salted and/or Iterated
40md5($salt.utf16le($pass))Raw Hash, Salted and/or Iterated
2600md5(md5($pass))Raw Hash, Salted and/or Iterated
3910md5(md5($pass).md5($salt))Raw Hash, Salted and/or Iterated
4400md5(sha1($pass))Raw Hash, Salted and/or Iterated
20900md5(sha1($pass).md5($pass).sha1($pass))Raw Hash, Salted and/or Iterated
21200md5(sha1($salt).md5($pass))Raw Hash, Salted and/or Iterated
4300md5(strtoupper(md5($pass)))Raw Hash, Salted and/or Iterated
30md5(utf16le($pass).$salt)Raw Hash, Salted and/or Iterated
110sha1($pass.$salt)Raw Hash, Salted and/or Iterated
120sha1($salt.$pass)Raw Hash, Salted and/or Iterated
4900sha1($salt.$pass.$salt)Raw Hash, Salted and/or Iterated
4520sha1($salt.sha1($pass))Raw Hash, Salted and/or Iterated
140sha1($salt.utf16le($pass))Raw Hash, Salted and/or Iterated
19300sha1($salt1.$pass.$salt2)Raw Hash, Salted and/or Iterated
14400sha1(CX)Raw Hash, Salted and/or Iterated
4700sha1(md5($pass))Raw Hash, Salted and/or Iterated
4710sha1(md5($pass).$salt)Raw Hash, Salted and/or Iterated
21100sha1(md5($pass.$salt))Raw Hash, Salted and/or Iterated
18500sha1(md5(md5($pass)))Raw Hash, Salted and/or Iterated
4500sha1(sha1($pass))Raw Hash, Salted and/or Iterated
130sha1(utf16le($pass).$salt)Raw Hash, Salted and/or Iterated
1410sha256($pass.$salt)Raw Hash, Salted and/or Iterated
1420sha256($salt.$pass)Raw Hash, Salted and/or Iterated
22300sha256($salt.$pass.$salt)Raw Hash, Salted and/or Iterated
1440sha256($salt.utf16le($pass))Raw Hash, Salted and/or Iterated
20800sha256(md5($pass))Raw Hash, Salted and/or Iterated
20710sha256(sha256($pass).$salt)Raw Hash, Salted and/or Iterated
1430sha256(utf16le($pass).$salt)Raw Hash, Salted and/or Iterated
1710sha512($pass.$salt)Raw Hash, Salted and/or Iterated
1720sha512($salt.$pass)Raw Hash, Salted and/or Iterated
1740sha512($salt.utf16le($pass))Raw Hash, Salted and/or Iterated
1730sha512(utf16le($pass).$salt)Raw Hash, Salted and/or Iterated
19500Ruby on Rails Restful-AuthenticationRaw Hash, Salted and/or Iterated
50HMAC-MD5 (key = $pass)Raw Hash, Authenticated
60HMAC-MD5 (key = $salt)Raw Hash, Authenticated
150HMAC-SHA1 (key = $pass)Raw Hash, Authenticated
160HMAC-SHA1 (key = $salt)Raw Hash, Authenticated
1450HMAC-SHA256 (key = $pass)Raw Hash, Authenticated
1460HMAC-SHA256 (key = $salt)Raw Hash, Authenticated
1750HMAC-SHA512 (key = $pass)Raw Hash, Authenticated
1760HMAC-SHA512 (key = $salt)Raw Hash, Authenticated
11750HMAC-Streebog-256 (key = $pass), big-endianRaw Hash, Authenticated
11760HMAC-Streebog-256 (key = $salt), big-endianRaw Hash, Authenticated
11850HMAC-Streebog-512 (key = $pass), big-endianRaw Hash, Authenticated
11860HMAC-Streebog-512 (key = $salt), big-endianRaw Hash, Authenticated
11500CRC32Raw Checksum
141003DES (PT = $salt, key = $pass)Raw Cipher, Known-Plaintext attack
14000DES (PT = $salt, key = $pass)Raw Cipher, Known-Plaintext attack
15400ChaCha20Raw Cipher, Known-Plaintext attack
14900Skip32 (PT = $salt, key = $pass)Raw Cipher, Known-Plaintext attack
11900PBKDF2-HMAC-MD5Generic KDF
12000PBKDF2-HMAC-SHA1Generic KDF
10900PBKDF2-HMAC-SHA256Generic KDF
12100PBKDF2-HMAC-SHA512Generic KDF
8900scryptGeneric KDF
400phpassGeneric KDF
16900Ansible VaultGeneric KDF
12001Atlassian (PBKDF2-HMAC-SHA1)Generic KDF
20200Python passlib pbkdf2-sha512Generic KDF
20300Python passlib pbkdf2-sha256Generic KDF
20400Python passlib pbkdf2-sha1Generic KDF
16100TACACS+Network Protocols
11400SIP digest authentication (MD5)Network Protocols
5300IKE-PSK MD5Network Protocols
5400IKE-PSK SHA1Network Protocols
2500WPA-EAPOL-PBKDF2Network Protocols
2501WPA-EAPOL-PMKNetwork Protocols
22000WPA-PBKDF2-PMKID+EAPOLNetwork Protocols
22001WPA-PMK-PMKID+EAPOLNetwork Protocols
16800WPA-PMKID-PBKDF2Network Protocols
16801WPA-PMKID-PMKNetwork Protocols
7300IPMI2 RAKP HMAC-SHA1Network Protocols
10200CRAM-MD5Network Protocols
4800iSCSI CHAP authentication, MD5(CHAP)Network Protocols
16500JWT (JSON Web Token)Network Protocols
22600Telegram Desktop App Passcode (PBKDF2-HMAC-SHA1)Network Protocols
22301Telegram Mobile App Passcode (SHA256)Network Protocols
7500Kerberos 5, etype 23, AS-REQ Pre-AuthNetwork Protocols
13100Kerberos 5, etype 23, TGS-REPNetwork Protocols
18200Kerberos 5, etype 23, AS-REPNetwork Protocols
19600Kerberos 5, etype 17, TGS-REPNetwork Protocols
19700Kerberos 5, etype 18, TGS-REPNetwork Protocols
19800Kerberos 5, etype 17, Pre-AuthNetwork Protocols
19900Kerberos 5, etype 18, Pre-AuthNetwork Protocols
5500NetNTLMv1 / NetNTLMv1+ESSNetwork Protocols
5600NetNTLMv2Network Protocols
23SkypeNetwork Protocols
11100PostgreSQL CRAM (MD5)Network Protocols
11200MySQL CRAM (SHA1)Network Protocols
8500RACFOperating System
6300AIX {smd5}Operating System
6700AIX {ssha1}Operating System
6400AIX {ssha256}Operating System
6500AIX {ssha512}Operating System
3000LMOperating System
19000QNX /etc/shadow (MD5)Operating System
19100QNX /etc/shadow (SHA256)Operating System
19200QNX /etc/shadow (SHA512)Operating System
15300DPAPI masterkey file v1Operating System
15900DPAPI masterkey file v2Operating System
7200GRUB 2Operating System
12800MS-AzureSync PBKDF2-HMAC-SHA256Operating System
12400BSDi Crypt, Extended DESOperating System
1000NTLMOperating System
122macOS v10.4, macOS v10.5, MacOS v10.6Operating System
1722macOS v10.7Operating System
7100macOS v10.8+ (PBKDF2-SHA512)Operating System
9900Radmin2Operating System
5800Samsung Android Password/PINOperating System
3200bcrypt $2*$, Blowfish (Unix)Operating System
500md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5)Operating System
1500descrypt, DES (Unix), Traditional DESOperating System
7400sha256crypt $5$, SHA256 (Unix)Operating System
1800sha512crypt $6$, SHA512 (Unix)Operating System
13800Windows Phone 8+ PIN/passwordOperating System
2410Cisco-ASA MD5Operating System
9200Cisco-IOS $8$ (PBKDF2-SHA256)Operating System
9300Cisco-IOS $9$ (scrypt)Operating System
5700Cisco-IOS type 4 (SHA256)Operating System
2400Cisco-PIX MD5Operating System
8100Citrix NetScaler (SHA1)Operating System
22200Citrix NetScaler (SHA512)Operating System
1100Domain Cached Credentials (DCC), MS CacheOperating System
2100Domain Cached Credentials 2 (DCC2), MS Cache 2Operating System
7000FortiGate (FortiOS)Operating System
125ArubaOSOperating System
501Juniper IVEOperating System
22Juniper NetScreen/SSG (ScreenOS)Operating System
15100Juniper/NetBSD sha1cryptOperating System
131MSSQL (2000)Database Server
132MSSQL (2005)Database Server
1731MSSQL (2012, 2014)Database Server
12PostgreSQLDatabase Server
3100Oracle H: Type (Oracle 7+)Database Server
112Oracle S: Type (Oracle 11+)Database Server
12300Oracle T: Type (Oracle 12+)Database Server
7401MySQL $A$ (sha256crypt)Database Server
200MySQL323Database Server
300MySQL4.1/MySQL5Database Server
8000Sybase ASEDatabase Server**
1421hMailServerFTP, HTTP, SMTP, LDAP Server
8300DNSSEC (NSEC3)FTP, HTTP, SMTP, LDAP Server
16400CRAM-MD5 DovecotFTP, HTTP, SMTP, LDAP Server
1411SSHA-256(Base64), LDAP {SSHA256}FTP, HTTP, SMTP, LDAP Server
1711SSHA-512(Base64), LDAP {SSHA512}FTP, HTTP, SMTP, LDAP Server
10901RedHat 389-DS LDAP (PBKDF2-HMAC-SHA256)FTP, HTTP, SMTP, LDAP Server
15000FileZilla Server >= 0.9.55FTP, HTTP, SMTP, LDAP Server
12600ColdFusion 10+FTP, HTTP, SMTP, LDAP Server
1600Apache $apr1$ MD5, md5apr1, MD5 (APR)FTP, HTTP, SMTP, LDAP Server
141Episerver 6.x < .NET 4FTP, HTTP, SMTP, LDAP Server
1441Episerver 6.x >= .NET 4FTP, HTTP, SMTP, LDAP Server
101nsldap, SHA-1(Base64), Netscape LDAP SHAFTP, HTTP, SMTP, LDAP Server
111nsldaps, SSHA-1(Base64), Netscape LDAP SSHAFTP, HTTP, SMTP, LDAP Server
7700SAP CODVN B (BCODE)Enterprise Application Software (EAS)
7701SAP CODVN B (BCODE) from RFC_READ_TABLEEnterprise Application Software (EAS)
7800SAP CODVN F/G (PASSCODE)Enterprise Application Software (EAS)
7801SAP CODVN F/G (PASSCODE) from RFC_READ_TABLEEnterprise Application Software (EAS)
10300SAP CODVN H (PWDSALTEDHASH) iSSHA-1Enterprise Application Software (EAS)
133PeopleSoftEnterprise Application Software (EAS)
13500PeopleSoft PS_TOKENEnterprise Application Software (EAS)
21500SolarWinds OrionEnterprise Application Software (EAS)
8600Lotus Notes/Domino 5Enterprise Application Software (EAS)
8700Lotus Notes/Domino 6Enterprise Application Software (EAS)
9100Lotus Notes/Domino 8Enterprise Application Software (EAS)
20600Oracle Transportation Management (SHA256)Enterprise Application Software (EAS)
4711Huawei sha1(md5($pass).$salt)Enterprise Application Software (EAS)
20711AuthMe sha256Enterprise Application Software (EAS)
12200eCryptfsFull-Disk Encryption (FDE)
22400AES Crypt (SHA256)Full-Disk Encryption (FDE)
14600LUKSFull-Disk Encryption (FDE)
13711VeraCrypt RIPEMD160 + XTS 512 bitFull-Disk Encryption (FDE)
13712VeraCrypt RIPEMD160 + XTS 1024 bitFull-Disk Encryption (FDE)
13713VeraCrypt RIPEMD160 + XTS 1536 bitFull-Disk Encryption (FDE)
13741VeraCrypt RIPEMD160 + XTS 512 bit + boot-modeFull-Disk Encryption (FDE)
13742VeraCrypt RIPEMD160 + XTS 1024 bit + boot-modeFull-Disk Encryption (FDE)
13743VeraCrypt RIPEMD160 + XTS 1536 bit + boot-modeFull-Disk Encryption (FDE)
13751VeraCrypt SHA256 + XTS 512 bitFull-Disk Encryption (FDE)
13752VeraCrypt SHA256 + XTS 1024 bitFull-Disk Encryption (FDE)
13753VeraCrypt SHA256 + XTS 1536 bitFull-Disk Encryption (FDE)
13761VeraCrypt SHA256 + XTS 512 bit + boot-modeFull-Disk Encryption (FDE)
13762VeraCrypt SHA256 + XTS 1024 bit + boot-modeFull-Disk Encryption (FDE)
13763VeraCrypt SHA256 + XTS 1536 bit + boot-modeFull-Disk Encryption (FDE)
13721VeraCrypt SHA512 + XTS 512 bitFull-Disk Encryption (FDE)
13722VeraCrypt SHA512 + XTS 1024 bitFull-Disk Encryption (FDE)
13723VeraCrypt SHA512 + XTS 1536 bitFull-Disk Encryption (FDE)
13771VeraCrypt Streebog-512 + XTS 512 bitFull-Disk Encryption (FDE)
13772VeraCrypt Streebog-512 + XTS 1024 bitFull-Disk Encryption (FDE)
13773VeraCrypt Streebog-512 + XTS 1536 bitFull-Disk Encryption (FDE)
13731VeraCrypt Whirlpool + XTS 512 bitFull-Disk Encryption (FDE)
13732VeraCrypt Whirlpool + XTS 1024 bitFull-Disk Encryption (FDE)
13733VeraCrypt Whirlpool + XTS 1536 bitFull-Disk Encryption (FDE)
16700FileVault 2Full-Disk Encryption (FDE)
20011DiskCryptor SHA512 + XTS 512 bitFull-Disk Encryption (FDE)
20012DiskCryptor SHA512 + XTS 1024 bitFull-Disk Encryption (FDE)
20013DiskCryptor SHA512 + XTS 1536 bitFull-Disk Encryption (FDE)
22100BitLockerFull-Disk Encryption (FDE)
12900Android FDE (Samsung DEK)Full-Disk Encryption (FDE)
8800Android FDE <= 4.3Full-Disk Encryption (FDE)
18300Apple File System (APFS)Full-Disk Encryption (FDE)
6211TrueCrypt RIPEMD160 + XTS 512 bitFull-Disk Encryption (FDE)
6212TrueCrypt RIPEMD160 + XTS 1024 bitFull-Disk Encryption (FDE)
6213TrueCrypt RIPEMD160 + XTS 1536 bitFull-Disk Encryption (FDE)
6241TrueCrypt RIPEMD160 + XTS 512 bit + boot-modeFull-Disk Encryption (FDE)
6242TrueCrypt RIPEMD160 + XTS 1024 bit + boot-modeFull-Disk Encryption (FDE)
6243TrueCrypt RIPEMD160 + XTS 1536 bit + boot-modeFull-Disk Encryption (FDE)
6221TrueCrypt SHA512 + XTS 512 bitFull-Disk Encryption (FDE)
6222TrueCrypt SHA512 + XTS 1024 bitFull-Disk Encryption (FDE)
6223TrueCrypt SHA512 + XTS 1536 bitFull-Disk Encryption (FDE)
6231TrueCrypt Whirlpool + XTS 512 bitFull-Disk Encryption (FDE)
6232TrueCrypt Whirlpool + XTS 1024 bitFull-Disk Encryption (FDE)
6233TrueCrypt Whirlpool + XTS 1536 bitFull-Disk Encryption (FDE)
10400PDF 1.1 - 1.3 (Acrobat 2 - 4)Documents
10410PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #1Documents
10420PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #2Documents
10500PDF 1.4 - 1.6 (Acrobat 5 - 8)Documents
10600PDF 1.7 Level 3 (Acrobat 9)Documents
10700PDF 1.7 Level 8 (Acrobat 10 - 11)Documents
9400MS Office 2007Documents
9500MS Office 2010Documents
9600MS Office 2013Documents
9700MS Office <= 2003 $0/$1, MD5 + RC4Documents
9710MS Office <= 2003 $0/$1, MD5 + RC4, collider #1Documents
9720MS Office <= 2003 $0/$1, MD5 + RC4, collider #2Documents
9800MS Office <= 2003 $3/$4, SHA1 + RC4Documents
9810MS Office <= 2003 $3, SHA1 + RC4, collider #1Documents
9820MS Office <= 2003 $3, SHA1 + RC4, collider #2Documents
18400Open Document Format (ODF) 1.2 (SHA-256, AES)Documents
18600Open Document Format (ODF) 1.1 (SHA-1, Blowfish)Documents
16200Apple Secure NotesDocuments
15500JKS Java Key Store Private Keys (SHA1)Password Managers
66001Password, agilekeychainPassword Managers
82001Password, cloudkeychainPassword Managers
9000Password Safe v2Password Managers
5200Password Safe v3Password Managers
6800LastPass + LastPass sniffedPassword Managers
13400KeePass 1 (AES/Twofish) and KeePass 2 (AES)Password Managers
11300Bitcoin/Litecoin wallet.datPassword Managers
16600Electrum Wallet (Salt-Type 1-3)Password Managers
21700Electrum Wallet (Salt-Type 4)Password Managers
21800Electrum Wallet (Salt-Type 5)Password Managers
12700Blockchain, My WalletPassword Managers
15200Blockchain, My Wallet, V2Password Managers
18800Blockchain, My Wallet, Second Password (SHA256)Password Managers
16300Ethereum Pre-Sale Wallet, PBKDF2-HMAC-SHA256Password Managers
15600Ethereum Wallet, PBKDF2-HMAC-SHA256Password Managers
15700Ethereum Wallet, SCRYPTPassword Managers
22500MultiBit Classic .key (MD5)Password Managers
22700MultiBit HD (scrypt)Password Managers
116007-ZipArchives
12500RAR3-hpArchives
13000RAR5Archives
17200PKZIP (Compressed)Archives
17220PKZIP (Compressed Multi-File)Archives
17225PKZIP (Mixed Multi-File)Archives
17230PKZIP (Mixed Multi-File Checksum-Only)Archives
17210PKZIP (Uncompressed)Archives
20500PKZIP Master KeyArchives
20510PKZIP Master Key (6 byte optimization)Archives
14700iTunes backup < 10.0Archives
14800iTunes backup >= 10.0Archives
23001SecureZIP AES-128Archives
23002SecureZIP AES-192Archives
23003SecureZIP AES-256Archives
13600WinZipArchives
18900Android BackupArchives
13200AxCryptArchives
13300AxCrypt in-memory SHA1Archives
8400WBB3 (Woltlab Burning Board)Forums, CMS, E-Commerce
2611vBulletin < v3.8.5Forums, CMS, E-Commerce
2711vBulletin >= v3.8.5Forums, CMS, E-Commerce
2612PHPSForums, CMS, E-Commerce
121SMF (Simple Machines Forum) > v1.1Forums, CMS, E-Commerce
3711MediaWiki B typeForums, CMS, E-Commerce
4521RedmineForums, CMS, E-Commerce
11Joomla < 2.5.18Forums, CMS, E-Commerce
13900OpenCartForums, CMS, E-Commerce
11000PrestaShopForums, CMS, E-Commerce
16000TripcodeForums, CMS, E-Commerce
7900Drupal7Forums, CMS, E-Commerce
21osCommerce, xtForums, CMS, E-Commerce
4522PunBBForums, CMS, E-Commerce
2811MyBB 1.2+, IPB2+ (Invision Power Board)Forums, CMS, E-Commerce
18100TOTP (HMAC-SHA1)One-Time Passwords
2000STDOUTPlaintext
99999PlaintextPlaintext
21600Web2py pbkdf2-sha512Framework
10000Django (PBKDF2-SHA256)Framework
124Django (SHA-1)Framework

hash 示例可查看

掩碼設置#

labcdefghijklmnopqrstuvwxyz 小寫字符
uABCDEFGHIJKLMNOPQRSTUVWXYZ 大寫字符
d0123456789 數字
h0123456789abcdef 常用小寫字符 + 數字
H0123456789ABCDEF 常用大寫字符 + 數字
s!"#$%&'()*+,-./:;<=>?@[\]^_{`
a?l?u?d?s 鍵盤上所有可見的字符
b0x00 - 0xff 可能是用來匹配像空格這種密碼的

常見掩碼設置

八位數字密碼:?d?d?d?d?d?d?d?d  
八位未知密碼:?a?a?a?a?a?a?a?a  
前四位為大寫字母,後面四位為數字:?u?u?u?u?d?d?d?d  
前四位為數字或者是小寫字母,後四位為大寫字母或者數字:?h?h?h?h?H?H?H?H  
前三個字符未知,中間為admin,后三位未知:?a?a?aadmin?a?a?a  
6-8位數字密碼:--increment --increment-min 6 --increment-max 8 ?l?l?l?l?l?l?l?l  
6-8位數字+小寫字母密碼:--increment --increment-min 6 --increment-max 8 ?h?h?h?h?h?h?h?h

🍃 自定義字符集

如果想破解自定義字符集,假設你知道一個密碼有 abcdefg1234!@+$,這是就需要自定義字符集,自己設置需要破解的字符。

--custom-charset1 [chars]等價於 -1  
--custom-charset2 [chars]等價於 -2  
--custom-charset3 [chars]等價於 -3  
--custom-charset4 [chars]等價於 -4  
在掩碼中用?1、?2、?3、?4來表示。

示例如下:

--custom-charset1 abcd123456!@-+。然後我們就可以用"?1"去表示這個字符集了  
--custom-charset2 ?l?d,這裡和?2就等價於?h  
-1 ?d?l?u,?1就表示數字+小寫字母+大寫字母  
-3 abcdef -4 123456 那麼?3?3?3?3?4?4?4?4就表示為前四位可能是“abcdef”,後四位可能是“123456”

🍃 密碼破解規則

(1)利用收集的公開字典進行破解
(2)使用 1-8 位數字進行破解。
(3)使用 1-8 位小寫字母進行破解
(4)使用 1-8 位大寫字母進行破解
(5)使用 1-8 位混合大小寫 + 數字 + 特殊字符進行破解

基本案例#

攻擊模式hash 類型示例
WordlistPhashcat -a 0 -m 400 example400.hash example.dict
Wordlist + RulesMD5hashcat -a 0 -m 0 example0.hash example.dict -r rules/best64.rule
Brute-ForceMD5hashcat -a 3 -m 0 example0.hash ?a?a?a?a?a?a
CombinatorMD5hashcat -a 1 -m 0 example0.hash example.dict example.dict

實際案例#

1、破解 7 位 MD5 值

$ hashcat -a 3 -m 0 --force 10e935b681dd5d9228d914ed31f86b79 ?d?d?d?d?d?d?d

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled.png

2、破解 7 為小寫字母

$ hashcat -a 3 -m 0 --force 1b1aee1f5339f686b32d9a255696f080 ?l?l?l?l?l?l?l

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%201.png

3、破解 1-9 為數字

$hashcat -a 3 -m 0 --force a1b36807dc763d423f055b617a835521 --increment --increment-min 1 --increment-max 8 ?d?d?d?d?d?d?d?d

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%202.png

4、破解特定字符集

$hashcat -a 3 -1 123456abcdf!@+- ca6d3ead08fa8e7eca93966b75f1c1b0 ?1?1?1?1?1

5、破解 1-8 為特定字符

$hashcat -a 3 -1 123456abcdf!@+- 9054fa315ce16f7f0955b4af06d1aa1b --increment --increment-min 1 --increment-max 8 ?1?1?1?1?1?1?1?1

6、破解 1-8 位數字 + 大小寫字母 + 課件的特殊符號

hashcat64.exe -a 3 -1 ?d?u?l?s d37fc9ee39dd45a7717e3e3e9415f65d --increment --increment-min 1 --increment-max 8 ?1?1?1?1?1?1?1?1  
或者:  
hashcat64.exe -a 3 d37fc9ee39dd45a7717e3e3e9415f65d --increment --increment-min 1 --increment-max 8 ?a?a?a?a?a?a?a?a

7、指定字典破解

-a 0是指定字典破解模式,-o是輸出結果到文件中  
hashcat64.exe -a 0 ede900ac1424436b55dc3c9f20cb97a8 password.txt -o result.txt

8、批量破解

hashcat64.exe -a 0 hash.txt password.txt -o result.txt

9、破解 Windows NT-hash,LM-hash

NT-hash  
$ hashcat -a 3 -m 1000 --force 1b1aee1f5339f686b32d9a255696f080 ?l?l?l?l?l?l?l  
  
LM-hash  
$ hashcat -a 3 -m 1000 --force 1b1aee1f5339f686b32d9a255696f080 ?l?l?l?l?l?l?l

10、破解 RAR 壓縮包密碼

先利用 rar2john 獲取 rar 文件的 hash 值:http://openwall.info/wiki/_media/john/johntheripper-v1.8.0.12-jumbo-1-bleeding-e6214ceab-2018-02-07-win-x64.7z

11、破解 ZIP 壓縮包密碼

通過 zip2john 獲取 zip 文件的 hash 值,利用 bindzip 壓縮的文件標識符為 pkzip2。

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%203.png

破解 pkzip2 時,-m 指定為 17200。

.\hashcat.exe -a 3 -m 17200 '$pkzip2$1*2*2*0*161b*19ca*26bf01cc*0*6c*8*161b*26bf*9bc1*169c0f03f18f797477...此處省略...c3f52a18d0537dca26b0baeae8a*$/pkzip2$' --force ?d?d?d?d?d?d

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%204.png

12、破解 word 加密文檔

wget https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/office2john.py
hashcat -a 0 -m 9500 --username -o crack.txt hash.txt /usr/share/wordlists/nmap.lst --force

13、破解 linux 下 /etc/shadow 文件的密碼

hashcat -a 3 -m 1800 --force '$6$H6LRx0yQ62gqLdg7$88r9sgiYtcMKELXTGvyFBPtZmTV.xw4CRamKwYjYIWxiXi3o9dKOlK.2yC3PM2JHRl/xfhXS2kleJmP63nSTJ/' ?l?l?l?l

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%205.png

利用 openssl 生產 sha512 的密碼。

$ openssl passwd -6 -salt xyz kalia  
$6$xyz$xWzXcL6LjBo1RJjRewXJs9MT7cTutuSUuNX.mVI8jOuBxdeBh4lw170Gx1HpKphRIrQJ82qX/CzJe0F7Soc/l.

利用 hashcat 嘗試破解,採用增量破解,密碼為 kalia,無畏小寫字符,大概花了 40 分鐘,速度還是慢。

hashcat -a 3 -m 1800 --force '$6$xyz$xWzXcL6LjBo1RJjRewXJs9MT7cTutuSUuNX.mVI8jOuBxdeBh4lw170Gx1HpKphRIrQJ82qX/CzJe0F7Soc/l.' --increment --increment-min 4 --increment-max 6 ?l?l?l?l?l

14、字典 + 掩碼暴力破解

在字典前後再加上暴力的字符序列,比如在字典後面加上 3 為數字。

a -6 (Hybrid dict + mask)

15、掩碼 + 字典暴力破解

a -7 (Hybridmask + dict)

查看破解結果#

直接利用 hashcat 命令查看

hashcat hash --show

查看 profile 文件。

/home/kali/.hashcat/hashcat.potfile

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%206.png

hashcat 圖形化#

項目地址:https://github.com/ctxis/crackerjack

🍃 啟動 python 的虛擬環境,報錯。

root@kali:~/crackerjack# python3 -m venv venv  
The virtual environment was not created successfully because ensurepip is not  
available.  On Debian/Ubuntu systems, you need to install the python3-venv  
package using the following command.  
  
    apt-get install python3-venv  
  
You may need to use sudo with that command.  After installing the python3-venv  
package, recreate your virtual environment.  
  
Failing command: ['/root/crackerjack/venv/bin/python3', '-Im', 'ensurepip', '--upgrade', '--default-pip']

🍃 安裝環境即可。

apt-get install python3-venv

🍃 建立環境。

root@kali:~/crackerjack# python3 -m venv venv  
root@kali:~/crackerjack# . venv/bin/activate

🍃 安裝依賴包。

pip --no-cache-dir install -r requirements.txt  
# 如果上述命令安裝失敗,可利用下面的命令一個個安裝  
pip install -i https://pypi.doubanio.com/simple/ --trusted-host http://pypi.doubanio.com/ Flask-crontab

flask db init  
flask db migrate  
flask db upgrade  
#######################  
export FLASK_ENV=development  
export FLASK_APP=app  
flask run

🍃 第二次啟動

root@kali:~/crackerjack# . venv/bin/activate  
flask run

訪問安裝界面

http://127.0.0.1:5000/install/

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%207.png

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%208.png

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%209.png

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%2010.png

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%2011.png


hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%2012.png

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%2013.png

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%2014.png

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%2015.png

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%2016.png

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%2017.png

hashcat%E6%96%87%E7%AB%A0%20870ae67c89824363af4d1d43bcfd3aef/Untitled%2019.png


參考:

https://tools.kali.org/password-attacks/hashcat

https://xz.aliyun.com/t/4008

https://www.freebuf.com/sectool/164507.html

載入中......
此文章數據所有權由區塊鏈加密技術和智能合約保障僅歸創作者所有。