% hashcat, cracking, passwords # Crack MD5 hash hashcat -m 0 -O # Crack NTLM hash hashcat -m 1000 -O # Crack NTLMv2 (Responder capture) hashcat -m 5600 -O # Crack SHA-512 Linux ($6$) hashcat -m 1800 -O # Crack Kerberoasting TGS hashcat -m 13100 -O # Crack AS-REP Roast hashcat -m 18200 -O # Crack WPA2 hashcat -m 22000 -O # Crack bcrypt hashcat -m 3200 -O # Crack JWT hashcat -m 16500 -O # With rules (best64) hashcat -m -r /usr/share/hashcat/rules/best64.rule -O # Mask attack - 4 digits hashcat -m -a 3 ?d?d?d?d # Mask attack - 8 lowercase hashcat -m -a 3 ?l?l?l?l?l?l?l?l # Mask attack - Password1! pattern hashcat -m -a 3 ?u?l?l?l?l?l?l?l?d?s # Show cracked passwords hashcat -m --show # Resume session hashcat --restore $ hashfile: find . -name "*.txt" -o -name "*.hash" 2>/dev/null $ wordlist: echo "/usr/share/wordlists/rockyou.txt" $ mode: echo "0\n100\n1000\n1400\n1700\n1800\n3200\n5600\n13100\n18200" --- --header "Mode: 0=MD5, 100=SHA1, 1000=NTLM, 1400=SHA256, 1700=SHA512, 1800=sha512crypt, 3200=bcrypt, 5600=NTLMv2, 13100=Kerberoast, 18200=AS-REP"