Hash crack - oscpname/RELAY_scenarios GitHub Wiki

Using hashcat

  1. wordlist (a0)
hashcat -a 0 -m 0 hash.txt /usr/share/wordlists/rockyou.txt
  1. brute-force (a3)
hashcat -a 3 -m 5600 hash.txt ?a?a?a?a?a
  1. Combine two wordlists to generate candidate passwords (a1)
hashcat -a 1 -m 0 hash.txt wordlist1.txt wordlist2.txt
  1. Hybrid Attack (a6)
#Append characters to words from a wordlist
hashcat -a 6 -m 0 hash.txt /usr/share/wordlists/rockyou.txt ?d?d

#Prepend characters to words from a wordlist
hashcat -a 7 -m 0 hash.txt ?d?d /usr/share/wordlists/rockyou.txt
  1. Specify a mask for custom character set (a3)
hashcat -a 3 -m 0 hash.txt ?l?u?d?s
  1. Using rules
hashcat -a 0 -m 0 hash.txt /usr/share/wordlists/rockyou.txt -r rules/best64.rule