Forrest logo
tool overview
On this page you find all important commands for the CLI tool hashcat. If the command you are looking for is missing please ask our AI.

hashcat

Hashcat is a powerful command-line tool used for advanced password cracking. It supports various hashing algorithms, including MD5, SHA1, SHA256, and more. The tool uses the brute-force method to recover lost passwords by trying different combinations until the correct one is found. It also supports dictionary attacks, where it uses a pre-existing list of words to crack passwords. Hashcat is highly customizable, offering options for defining character sets, rules, and mask attacks to optimize the cracking process. It can utilize the power of GPUs to speed up the cracking process by performing parallel computations. The tool is continuously updated with new features and improvements, ensuring compatibility with the latest password encryption techniques. Hashcat is widely used by security professionals, penetration testers, and forensic experts to test the robustness of passwords and for password recovery purposes. It is available for Windows, macOS, and Linux systems, providing a versatile solution for password cracking needs.

List of commands for hashcat:

  • hashcat:tldr:31b22 hashcat: Perform a combination attack (mode 1) using the concatenation of words from two different custom dictionaries.
    $ hashcat --hash-type ${hash_type_id} --attack-mode ${1} ${hash_value} ${-path-to-dictionary1-txt} ${-path-to-dictionary2-txt}
    try on your machine
    explain this command
  • hashcat:tldr:79a81 hashcat: Perform a brute-force attack (mode 3) with a known pattern of 4 digits.
    $ hashcat --hash-type ${hash_type_id} --attack-mode ${3} ${hash_value} "${?d?d?d?d}"
    try on your machine
    explain this command
  • hashcat:tldr:95c38 hashcat: Perform a brute-force attack (mode 3) with the default hashcat mask.
    $ hashcat --hash-type ${hash_type_id} --attack-mode ${3} ${hash_value}
    try on your machine
    explain this command
  • hashcat:tldr:b140c hashcat: Perform a brute-force attack (mode 3) using at most 8 of all printable ASCII characters.
    $ hashcat --hash-type ${hash_type_id} --attack-mode ${3} --increment ${hash_value} "${?a?a?a?a?a?a?a?a}"
    try on your machine
    explain this command
  • hashcat:tldr:b9127 hashcat: Show result of an already cracked hash.
    $ hashcat --show ${hash_value}
    try on your machine
    explain this command
  • hashcat:tldr:f0a6c hashcat: Perform a rule-based dictionary attack (mode 0) using the RockYou wordlist mutated with common password variations.
    $ hashcat --hash-type ${hash_type_id} --attack-mode ${0} --rules-file ${-usr-share-hashcat-rules-best64-rule} ${hash_value} ${-usr-share-wordlists-rockyou-txt}
    try on your machine
    explain this command
tool overview