## π Hashcat Cheat Sheet
## π’ Common Hash Types (-m
)
Hash Type | Mode | Description |
---|---|---|
MD5 | 0 | md5($pass) |
SHA1 | 100 | sha1($pass) |
SHA256 | 1400 | sha256($pass) |
NTLM | 1000 | NT Hash (Windows) |
bcrypt | 3200 | Blowfish (Unix $2*$ ) |
WPA/WPA2 | 22000 | Wi-Fi handshake (HC22000) |
LM | 3000 | LAN Manager (legacy) |
WordPress MD5 | 400 | md5($pass.$salt) |
## π― Attack Modes (-a
)
Mode | Type | Description |
---|---|---|
0 | Dictionary | Wordlist attack |
1 | Combination | Combine two wordlists |
3 | Brute-force (Mask) | Try every combination |
6 | Hybrid Wordlist+Mask | Append mask to wordlist |
7 | Hybrid Mask+Wordlist | Prepend mask to wordlist |
## π Examples
# Dictionary Attack
hashcat -m 0 -a 0 hashes.txt rockyou.txt
# Brute-force (Mask Attack)
hashcat -m 0 -a 3 hashes.txt ?a?a?a?a?a
# Hybrid Attack (Wordlist + Mask)
hashcat -m 0 -a 6 hashes.txt rockyou.txt ?d?d
# Resume Cracking
hashcat --restore
# Show Cracked Passwords
hashcat -m 0 -a 0 hashes.txt rockyou.txt --show
## π οΈ Useful Options
Option | Description |
---|---|
--force |
Bypass warnings (use cautiously) |
--show |
Show cracked results |
--username |
Ignore usernames in hashfile |
--status |
Show live cracking status |
--outfile |
Save cracked hashes to file |
--increment |
Enable incremental mask attack |
--session <name> |
Save or resume by session name |
--restore |
Resume from session |
--potfile-disable |
Donβt write to .potfile |