0% found this document useful (0 votes)
34 views

Hashcat - Help

The document provides a comprehensive help guide for hashcat version 6.2.6, detailing its usage, options, and available hash modes. It includes command-line options for configuring various parameters such as hash types, attack modes, and output formats. Additionally, it lists numerous supported hash algorithms along with their corresponding identifiers.

Uploaded by

Patrick Resende
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Hashcat - Help

The document provides a comprehensive help guide for hashcat version 6.2.6, detailing its usage, options, and available hash modes. It includes command-line options for configuring various parameters such as hash types, attack modes, and output formats. Additionally, it lists numerous supported hash algorithms along with their corresponding identifiers.

Uploaded by

Patrick Resende
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 25

C:\Users\TXX\Desktop\hashcat-6.2.6>hashcat.

exe -h

hashcat (v6.2.6) starting in help mode

Usage: hashcat [options]... hash|hashfile|hccapxfile [dictionary|mask|directory]...

- [ Options ] -

Options Short / Long | Type | Description | Example

================================+======+=====================================
=================+=======================

-m, --hash-type | Num | Hash-type, references below (otherwise autodetect) | -m


1000

-a, --attack-mode | Num | Attack-mode, see references below | -a 3

-V, --version | | Print version |

-h, --help | | Print help |

--quiet | | Suppress output |

--hex-charset | | Assume charset is given in hex |

--hex-salt | | Assume salt is given in hex |

--hex-wordlist | | Assume words in wordlist are given in hex |

--force | | Ignore warnings |

--deprecated-check-disable | | Enable deprecated plugins |

--status | | Enable automatic update of the status screen |

--status-json | | Enable JSON format for status output |

--status-timer | Num | Sets seconds between status screen updates to X | --


status-timer=1

--stdin-timeout-abort | Num | Abort if there is no input from stdin for X seconds | --


stdin-timeout-abort=300

--machine-readable | | Display the status view in a machine-readable format |

--keep-guessing | | Keep guessing the hash after it has been cracked |

--self-test-disable | | Disable self-test functionality on startup |

--loopback | | Add new plains to induct directory |

--markov-hcstat2 | File | Specify hcstat2 file to use | --markov-


hcstat2=my.hcstat2
--markov-disable | | Disables markov-chains, emulates classic brute-force |

--markov-classic | | Enables classic markov-chains, no per-position |

--markov-inverse | | Enables inverse markov-chains, no per-position |

-t, --markov-threshold | Num | Threshold X when to stop accepting new markov-chains |


-t 50

--runtime | Num | Abort session after X seconds of runtime | --runtime=10

--session | Str | Define specific session name | --session=mysession

--restore | | Restore session from --session |

--restore-disable | | Do not write restore file |

--restore-file-path | File | Specific path to restore file | --restore-file-


path=x.restore

-o, --outfile | File | Define outfile for recovered hash | -o outfile.txt

--outfile-format | Str | Outfile format to use, separated with commas | --outfile-


format=1,3

--outfile-autohex-disable | | Disable the use of $HEX[] in output plains |

--outfile-check-timer | Num | Sets seconds between outfile checks to X | --outfile-


check-timer=30

--wordlist-autohex-disable | | Disable the conversion of $HEX[] from the wordlist |

-p, --separator | Char | Separator char for hashlists and outfile | -p :

--stdout | | Do not crack a hash, instead print candidates only |

--show | | Compare hashlist with potfile; show cracked hashes |

--left | | Compare hashlist with potfile; show uncracked hashes |

--username | | Enable ignoring of usernames in hashfile |

--remove | | Enable removal of hashes once they are cracked |

--remove-timer | Num | Update input hash file each X seconds | --remove-


timer=30

--potfile-disable | | Do not write potfile |

--potfile-path | File | Specific path to potfile | --potfile-path=my.pot

--encoding-from | Code | Force internal wordlist encoding from X | --


encoding-from=iso-8859-15

--encoding-to | Code | Force internal wordlist encoding to X | --encoding-


to=utf-32le

--debug-mode | Num | Defines the debug mode (hybrid only by using rules) | --
debug-mode=4
--debug-file | File | Output file for debugging rules | --debug-
file=good.log

--induction-dir | Dir | Specify the induction directory to use for loopback | --


induction=inducts

--outfile-check-dir | Dir | Specify the outfile directory to monitor for plains | --outfile-
check-dir=x

--logfile-disable | | Disable the logfile |

--hccapx-message-pair | Num | Load only message pairs from hccapx matching X | --


hccapx-message-pair=2

--nonce-error-corrections | Num | The BF size range to replace AP's nonce last bytes | --
nonce-error-corrections=16

--keyboard-layout-mapping | File | Keyboard layout mapping table for special hash-modes


| --keyb=german.hckmap

--truecrypt-keyfiles | File | Keyfiles to use, separated with commas | --truecrypt-


keyf=x.png

--veracrypt-keyfiles | File | Keyfiles to use, separated with commas | --veracrypt-


keyf=x.txt

--veracrypt-pim-start | Num | VeraCrypt personal iterations multiplier start | --


veracrypt-pim-start=450

--veracrypt-pim-stop | Num | VeraCrypt personal iterations multiplier stop | --


veracrypt-pim-stop=500

-b, --benchmark | | Run benchmark of selected hash-modes |

--benchmark-all | | Run benchmark of all hash-modes (requires -b) |

--speed-only | | Return expected speed of the attack, then quit |

--progress-only | | Return ideal progress step size and time to process |

-c, --segment-size | Num | Sets size in MB to cache from the wordfile to X | -c 32

--bitmap-min | Num | Sets minimum bits allowed for bitmaps to X | --bitmap-


min=24

--bitmap-max | Num | Sets maximum bits allowed for bitmaps to X | --


bitmap-max=24

--cpu-affinity | Str | Locks to CPU devices, separated with commas | --cpu-


affinity=1,2,3

--hook-threads | Num | Sets number of threads for a hook (per compute unit) | --
hook-threads=8

--hash-info | | Show information for each hash-mode |

--example-hashes | | Alias of --hash-info |


--backend-ignore-cuda | | Do not try to open CUDA interface on startup |

--backend-ignore-hip | | Do not try to open HIP interface on startup |

--backend-ignore-metal | | Do not try to open Metal interface on startup |

--backend-ignore-opencl | | Do not try to open OpenCL interface on startup |

-I, --backend-info | | Show system/evironment/backend API info | -I or -II

-d, --backend-devices | Str | Backend devices to use, separated with commas | -d 1

-D, --opencl-device-types | Str | OpenCL device-types to use, separated with commas | -


D1

-O, --optimized-kernel-enable | | Enable optimized kernels (limits password length) |

-M, --multiply-accel-disable | | Disable multiply kernel-accel with processor count |

-w, --workload-profile | Num | Enable a specific workload profile, see pool below | -w 3

-n, --kernel-accel | Num | Manual workload tuning, set outerloop step size to X | -n 64

-u, --kernel-loops | Num | Manual workload tuning, set innerloop step size to X | -u
256

-T, --kernel-threads | Num | Manual workload tuning, set thread count to X | -T 64

--backend-vector-width | Num | Manually override backend vector-width to X | --


backend-vector=4

--spin-damp | Num | Use CPU for device synchronization, in percent | --spin-


damp=10

--hwmon-disable | | Disable temperature and fanspeed reads and triggers |

--hwmon-temp-abort | Num | Abort if temperature reaches X degrees Celsius | --


hwmon-temp-abort=100

--scrypt-tmto | Num | Manually override TMTO value for scrypt to X | --scrypt-


tmto=3

-s, --skip | Num | Skip X words from the start | -s 1000000

-l, --limit | Num | Limit X words from the start + skipped words | -l 1000000

--keyspace | | Show keyspace base:mod values and quit |

-j, --rule-left | Rule | Single rule applied to each word from left wordlist | -j 'c'

-k, --rule-right | Rule | Single rule applied to each word from right wordlist | -k '^-'

-r, --rules-file | File | Multiple rules applied to each word from wordlists | -r
rules/best64.rule

-g, --generate-rules | Num | Generate X random rules | -g 10000

--generate-rules-func-min | Num | Force min X functions per rule |

--generate-rules-func-max | Num | Force max X functions per rule |


--generate-rules-func-sel | Str | Pool of rule operators valid for random rule engine | --
generate-rules-func-sel=ioTlc

--generate-rules-seed | Num | Force RNG seed set to X |

-1, --custom-charset1 | CS | User-defined charset ?1 | -1 ?l?d?u

-2, --custom-charset2 | CS | User-defined charset ?2 | -2 ?l?d?s

-3, --custom-charset3 | CS | User-defined charset ?3 |

-4, --custom-charset4 | CS | User-defined charset ?4 |

--identify | | Shows all supported algorithms for input hashes | --identify


my.hash

-i, --increment | | Enable mask increment mode |

--increment-min | Num | Start mask incrementing at X | --increment-


min=4

--increment-max | Num | Stop mask incrementing at X | --increment-


max=8

-S, --slow-candidates | | Enable slower (but advanced) candidate generators |

--brain-server | | Enable brain server |

--brain-server-timer | Num | Update the brain server dump each X seconds (min:60) | --
brain-server-timer=300

-z, --brain-client | | Enable brain client, activates -S |

--brain-client-features | Num | Define brain client features, see below | --brain-


client-features=3

--brain-host | Str | Brain server host (IP or domain) | --brain-


host=127.0.0.1

--brain-port | Port | Brain server port | --brain-port=13743

--brain-password | Str | Brain server authentication password | --brain-


password=bZfhCvGUSjRq

--brain-session | Hex | Overrides automatically calculated brain session | --brain-


session=0x2ae611db

--brain-session-whitelist | Hex | Allow given sessions only, separated with commas | --


brain-session-whitelist=0x2ae611db

- [ Hash modes ] -

# | Name | Category
======+============================================================+=========
=============================

900 | MD4 | Raw Hash

0 | MD5 | Raw Hash

100 | SHA1 | Raw Hash

1300 | SHA2-224 | Raw Hash

1400 | SHA2-256 | Raw Hash

10800 | SHA2-384 | Raw Hash

1700 | SHA2-512 | Raw Hash

17300 | SHA3-224 | Raw Hash

17400 | SHA3-256 | Raw Hash

17500 | SHA3-384 | Raw Hash

17600 | SHA3-512 | Raw Hash

6000 | RIPEMD-160 | Raw Hash

600 | BLAKE2b-512 | Raw Hash

11700 | GOST R 34.11-2012 (Streebog) 256-bit, big-endian | Raw Hash

11800 | GOST R 34.11-2012 (Streebog) 512-bit, big-endian | Raw Hash

6900 | GOST R 34.11-94 | Raw Hash

17010 | GPG (AES-128/AES-256 (SHA-1($pass))) | Raw Hash

5100 | Half MD5 | Raw Hash

17700 | Keccak-224 | Raw Hash

17800 | Keccak-256 | Raw Hash

17900 | Keccak-384 | Raw Hash

18000 | Keccak-512 | Raw Hash

6100 | Whirlpool | Raw Hash

10100 | SipHash | Raw Hash

70 | md5(utf16le($pass)) | Raw Hash

170 | sha1(utf16le($pass)) | Raw Hash

1470 | sha256(utf16le($pass)) | Raw Hash

10870 | sha384(utf16le($pass)) | Raw Hash

1770 | sha512(utf16le($pass)) | Raw Hash


610 | BLAKE2b-512($pass.$salt) | Raw Hash salted and/or iterated

620 | BLAKE2b-512($salt.$pass) | Raw Hash salted and/or iterated

10 | md5($pass.$salt) | Raw Hash salted and/or iterated

20 | md5($salt.$pass) | Raw Hash salted and/or iterated

3800 | md5($salt.$pass.$salt) | Raw Hash salted and/or iterated

3710 | md5($salt.md5($pass)) | Raw Hash salted and/or iterated

4110 | md5($salt.md5($pass.$salt)) | Raw Hash salted and/or iterated

4010 | md5($salt.md5($salt.$pass)) | Raw Hash salted and/or iterated

21300 | md5($salt.sha1($salt.$pass)) | Raw Hash salted and/or iterated

40 | md5($salt.utf16le($pass)) | Raw Hash salted and/or iterated

2600 | md5(md5($pass)) | Raw Hash salted and/or iterated

3910 | md5(md5($pass).md5($salt)) | Raw Hash salted and/or iterated

3500 | md5(md5(md5($pass))) | Raw Hash salted and/or iterated

4400 | md5(sha1($pass)) | Raw Hash salted and/or iterated

4410 | md5(sha1($pass).$salt) | Raw Hash salted and/or iterated

20900 | md5(sha1($pass).md5($pass).sha1($pass)) | Raw Hash salted and/or


iterated

21200 | md5(sha1($salt).md5($pass)) | Raw Hash salted and/or iterated

4300 | md5(strtoupper(md5($pass))) | Raw Hash salted and/or iterated

30 | md5(utf16le($pass).$salt) | Raw Hash salted and/or iterated

110 | sha1($pass.$salt) | Raw Hash salted and/or iterated

120 | sha1($salt.$pass) | Raw Hash salted and/or iterated

4900 | sha1($salt.$pass.$salt) | Raw Hash salted and/or iterated

4520 | sha1($salt.sha1($pass)) | Raw Hash salted and/or iterated

24300 | sha1($salt.sha1($pass.$salt)) | Raw Hash salted and/or iterated

140 | sha1($salt.utf16le($pass)) | Raw Hash salted and/or iterated

19300 | sha1($salt1.$pass.$salt2) | Raw Hash salted and/or iterated

14400 | sha1(CX) | Raw Hash salted and/or iterated

4700 | sha1(md5($pass)) | Raw Hash salted and/or iterated

4710 | sha1(md5($pass).$salt) | Raw Hash salted and/or iterated

21100 | sha1(md5($pass.$salt)) | Raw Hash salted and/or iterated


18500 | sha1(md5(md5($pass))) | Raw Hash salted and/or iterated

4500 | sha1(sha1($pass)) | Raw Hash salted and/or iterated

4510 | sha1(sha1($pass).$salt) | Raw Hash salted and/or iterated

5000 | sha1(sha1($salt.$pass.$salt)) | Raw Hash salted and/or iterated

130 | sha1(utf16le($pass).$salt) | Raw Hash salted and/or iterated

1410 | sha256($pass.$salt) | Raw Hash salted and/or iterated

1420 | sha256($salt.$pass) | Raw Hash salted and/or iterated

22300 | sha256($salt.$pass.$salt) | Raw Hash salted and/or iterated

20720 | sha256($salt.sha256($pass)) | Raw Hash salted and/or iterated

21420 | sha256($salt.sha256_bin($pass)) | Raw Hash salted and/or iterated

1440 | sha256($salt.utf16le($pass)) | Raw Hash salted and/or iterated

20800 | sha256(md5($pass)) | Raw Hash salted and/or iterated

20710 | sha256(sha256($pass).$salt) | Raw Hash salted and/or iterated

21400 | sha256(sha256_bin($pass)) | Raw Hash salted and/or iterated

1430 | sha256(utf16le($pass).$salt) | Raw Hash salted and/or iterated

10810 | sha384($pass.$salt) | Raw Hash salted and/or iterated

10820 | sha384($salt.$pass) | Raw Hash salted and/or iterated

10840 | sha384($salt.utf16le($pass)) | Raw Hash salted and/or iterated

10830 | sha384(utf16le($pass).$salt) | Raw Hash salted and/or iterated

1710 | sha512($pass.$salt) | Raw Hash salted and/or iterated

1720 | sha512($salt.$pass) | Raw Hash salted and/or iterated

1740 | sha512($salt.utf16le($pass)) | Raw Hash salted and/or iterated

1730 | sha512(utf16le($pass).$salt) | Raw Hash salted and/or iterated

50 | HMAC-MD5 (key = $pass) | Raw Hash authenticated

60 | HMAC-MD5 (key = $salt) | Raw Hash authenticated

150 | HMAC-SHA1 (key = $pass) | Raw Hash authenticated

160 | HMAC-SHA1 (key = $salt) | Raw Hash authenticated

1450 | HMAC-SHA256 (key = $pass) | Raw Hash authenticated

1460 | HMAC-SHA256 (key = $salt) | Raw Hash authenticated

1750 | HMAC-SHA512 (key = $pass) | Raw Hash authenticated

1760 | HMAC-SHA512 (key = $salt) | Raw Hash authenticated


11750 | HMAC-Streebog-256 (key = $pass), big-endian | Raw Hash authenticated

11760 | HMAC-Streebog-256 (key = $salt), big-endian | Raw Hash authenticated

11850 | HMAC-Streebog-512 (key = $pass), big-endian | Raw Hash authenticated

11860 | HMAC-Streebog-512 (key = $salt), big-endian | Raw Hash authenticated

28700 | Amazon AWS4-HMAC-SHA256 | Raw Hash authenticated

11500 | CRC32 | Raw Checksum

27900 | CRC32C | Raw Checksum

28000 | CRC64Jones | Raw Checksum

18700 | Java Object hashCode() | Raw Checksum

25700 | MurmurHash | Raw Checksum

27800 | MurmurHash3 | Raw Checksum

14100 | 3DES (PT = $salt, key = $pass) | Raw Cipher, Known-plaintext attack

14000 | DES (PT = $salt, key = $pass) | Raw Cipher, Known-plaintext attack

26401 | AES-128-ECB NOKDF (PT = $salt, key = $pass) | Raw Cipher, Known-plaintext
attack

26402 | AES-192-ECB NOKDF (PT = $salt, key = $pass) | Raw Cipher, Known-plaintext
attack

26403 | AES-256-ECB NOKDF (PT = $salt, key = $pass) | Raw Cipher, Known-plaintext
attack

15400 | ChaCha20 | Raw Cipher, Known-plaintext attack

14500 | Linux Kernel Crypto API (2.4) | Raw Cipher, Known-plaintext attack

14900 | Skip32 (PT = $salt, key = $pass) | Raw Cipher, Known-plaintext attack

11900 | PBKDF2-HMAC-MD5 | Generic KDF

12000 | PBKDF2-HMAC-SHA1 | Generic KDF

10900 | PBKDF2-HMAC-SHA256 | Generic KDF

12100 | PBKDF2-HMAC-SHA512 | Generic KDF

8900 | scrypt | Generic KDF

400 | phpass | Generic KDF

16100 | TACACS+ | Network Protocol

11400 | SIP digest authentication (MD5) | Network Protocol

5300 | IKE-PSK MD5 | Network Protocol

5400 | IKE-PSK SHA1 | Network Protocol


25100 | SNMPv3 HMAC-MD5-96 | Network Protocol

25000 | SNMPv3 HMAC-MD5-96/HMAC-SHA1-96 | Network Protocol

25200 | SNMPv3 HMAC-SHA1-96 | Network Protocol

26700 | SNMPv3 HMAC-SHA224-128 | Network Protocol

26800 | SNMPv3 HMAC-SHA256-192 | Network Protocol

26900 | SNMPv3 HMAC-SHA384-256 | Network Protocol

27300 | SNMPv3 HMAC-SHA512-384 | Network Protocol

2500 | WPA-EAPOL-PBKDF2 | Network Protocol

2501 | WPA-EAPOL-PMK | Network Protocol

22000 | WPA-PBKDF2-PMKID+EAPOL | Network Protocol

22001 | WPA-PMK-PMKID+EAPOL | Network Protocol

16800 | WPA-PMKID-PBKDF2 | Network Protocol

16801 | WPA-PMKID-PMK | Network Protocol

7300 | IPMI2 RAKP HMAC-SHA1 | Network Protocol

10200 | CRAM-MD5 | Network Protocol

16500 | JWT (JSON Web Token) | Network Protocol

29200 | Radmin3 | Network Protocol

19600 | Kerberos 5, etype 17, TGS-REP | Network Protocol

19800 | Kerberos 5, etype 17, Pre-Auth | Network Protocol

28800 | Kerberos 5, etype 17, DB | Network Protocol

19700 | Kerberos 5, etype 18, TGS-REP | Network Protocol

19900 | Kerberos 5, etype 18, Pre-Auth | Network Protocol

28900 | Kerberos 5, etype 18, DB | Network Protocol

7500 | Kerberos 5, etype 23, AS-REQ Pre-Auth | Network Protocol

13100 | Kerberos 5, etype 23, TGS-REP | Network Protocol

18200 | Kerberos 5, etype 23, AS-REP | Network Protocol

5500 | NetNTLMv1 / NetNTLMv1+ESS | Network Protocol

27000 | NetNTLMv1 / NetNTLMv1+ESS (NT) | Network Protocol

5600 | NetNTLMv2 | Network Protocol

27100 | NetNTLMv2 (NT) | Network Protocol

29100 | Flask Session Cookie ($salt.$salt.$pass) | Network Protocol


4800 | iSCSI CHAP authentication, MD5(CHAP) | Network Protocol

8500 | RACF | Operating System

6300 | AIX {smd5} | Operating System

6700 | AIX {ssha1} | Operating System

6400 | AIX {ssha256} | Operating System

6500 | AIX {ssha512} | Operating System

3000 | LM | Operating System

19000 | QNX /etc/shadow (MD5) | Operating System

19100 | QNX /etc/shadow (SHA256) | Operating System

19200 | QNX /etc/shadow (SHA512) | Operating System

15300 | DPAPI masterkey file v1 (context 1 and 2) | Operating System

15310 | DPAPI masterkey file v1 (context 3) | Operating System

15900 | DPAPI masterkey file v2 (context 1 and 2) | Operating System

15910 | DPAPI masterkey file v2 (context 3) | Operating System

7200 | GRUB 2 | Operating System

12800 | MS-AzureSync PBKDF2-HMAC-SHA256 | Operating System

12400 | BSDi Crypt, Extended DES | Operating System

1000 | NTLM | Operating System

9900 | Radmin2 | Operating System

5800 | Samsung Android Password/PIN | Operating System

28100 | Windows Hello PIN/Password | Operating System

13800 | Windows Phone 8+ PIN/password | Operating System

2410 | Cisco-ASA MD5 | Operating System

9200 | Cisco-IOS $8$ (PBKDF2-SHA256) | Operating System

9300 | Cisco-IOS $9$ (scrypt) | Operating System

5700 | Cisco-IOS type 4 (SHA256) | Operating System

2400 | Cisco-PIX MD5 | Operating System

8100 | Citrix NetScaler (SHA1) | Operating System

22200 | Citrix NetScaler (SHA512) | Operating System

1100 | Domain Cached Credentials (DCC), MS Cache | Operating System

2100 | Domain Cached Credentials 2 (DCC2), MS Cache 2 | Operating System


7000 | FortiGate (FortiOS) | Operating System

26300 | FortiGate256 (FortiOS256) | Operating System

125 | ArubaOS | Operating System

501 | Juniper IVE | Operating System

22 | Juniper NetScreen/SSG (ScreenOS) | Operating System

15100 | Juniper/NetBSD sha1crypt | Operating System

26500 | iPhone passcode (UID key + System Keybag) | Operating System

122 | macOS v10.4, macOS v10.5, macOS v10.6 | Operating System

1722 | macOS v10.7 | Operating System

7100 | macOS v10.8+ (PBKDF2-SHA512) | Operating System

3200 | bcrypt $2*$, Blowfish (Unix) | Operating System

500 | md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5) | Operating System

1500 | descrypt, DES (Unix), Traditional DES | Operating System

29000 | sha1($salt.sha1(utf16le($username).':'.utf16le($pass))) | Operating System

7400 | sha256crypt $5$, SHA256 (Unix) | Operating System

1800 | sha512crypt $6$, SHA512 (Unix) | Operating System

24600 | SQLCipher | Database Server

131 | MSSQL (2000) | Database Server

132 | MSSQL (2005) | Database Server

1731 | MSSQL (2012, 2014) | Database Server

24100 | MongoDB ServerKey SCRAM-SHA-1 | Database Server

24200 | MongoDB ServerKey SCRAM-SHA-256 | Database Server

12 | PostgreSQL | Database Server

11100 | PostgreSQL CRAM (MD5) | Database Server

28600 | PostgreSQL SCRAM-SHA-256 | Database Server

3100 | Oracle H: Type (Oracle 7+) | Database Server

112 | Oracle S: Type (Oracle 11+) | Database Server

12300 | Oracle T: Type (Oracle 12+) | Database Server

7401 | MySQL $A$ (sha256crypt) | Database Server

11200 | MySQL CRAM (SHA1) | Database Server

200 | MySQL323 | Database Server


300 | MySQL4.1/MySQL5 | Database Server

8000 | Sybase ASE | Database Server

8300 | DNSSEC (NSEC3) | FTP, HTTP, SMTP, LDAP Server

25900 | KNX IP Secure - Device Authentication Code | FTP, HTTP, SMTP, LDAP Server

16400 | CRAM-MD5 Dovecot | FTP, HTTP, SMTP, LDAP Server

1411 | SSHA-256(Base64), LDAP {SSHA256} | FTP, HTTP, SMTP, LDAP Server

1711 | SSHA-512(Base64), LDAP {SSHA512} | FTP, HTTP, SMTP, LDAP Server

24900 | Dahua Authentication MD5 | FTP, HTTP, SMTP, LDAP Server

10901 | RedHat 389-DS LDAP (PBKDF2-HMAC-SHA256) | FTP, HTTP, SMTP, LDAP


Server

15000 | FileZilla Server >= 0.9.55 | FTP, HTTP, SMTP, LDAP Server

12600 | ColdFusion 10+ | FTP, HTTP, SMTP, LDAP Server

1600 | Apache $apr1$ MD5, md5apr1, MD5 (APR) | FTP, HTTP, SMTP, LDAP
Server

141 | Episerver 6.x < .NET 4 | FTP, HTTP, SMTP, LDAP Server

1441 | Episerver 6.x >= .NET 4 | FTP, HTTP, SMTP, LDAP Server

1421 | hMailServer | FTP, HTTP, SMTP, LDAP Server

101 | nsldap, SHA-1(Base64), Netscape LDAP SHA | FTP, HTTP, SMTP, LDAP Server

111 | nsldaps, SSHA-1(Base64), Netscape LDAP SSHA | FTP, HTTP, SMTP, LDAP
Server

7700 | SAP CODVN B (BCODE) | Enterprise Application Software (EAS)

7701 | SAP CODVN B (BCODE) from RFC_READ_TABLE | Enterprise Application


Software (EAS)

7800 | SAP CODVN F/G (PASSCODE) | Enterprise Application Software


(EAS)

7801 | SAP CODVN F/G (PASSCODE) from RFC_READ_TABLE | Enterprise Application


Software (EAS)

10300 | SAP CODVN H (PWDSALTEDHASH) iSSHA-1 | Enterprise Application


Software (EAS)

133 | PeopleSoft | Enterprise Application Software (EAS)

13500 | PeopleSoft PS_TOKEN | Enterprise Application Software (EAS)

21500 | SolarWinds Orion | Enterprise Application Software (EAS)

21501 | SolarWinds Orion v2 | Enterprise Application Software (EAS)

24 | SolarWinds Serv-U | Enterprise Application Software (EAS)


8600 | Lotus Notes/Domino 5 | Enterprise Application Software (EAS)

8700 | Lotus Notes/Domino 6 | Enterprise Application Software (EAS)

9100 | Lotus Notes/Domino 8 | Enterprise Application Software (EAS)

26200 | OpenEdge Progress Encode | Enterprise Application Software


(EAS)

20600 | Oracle Transportation Management (SHA256) | Enterprise Application


Software (EAS)

4711 | Huawei sha1(md5($pass).$salt) | Enterprise Application Software


(EAS)

20711 | AuthMe sha256 | Enterprise Application Software (EAS)

22400 | AES Crypt (SHA256) | Full-Disk Encryption (FDE)

27400 | VMware VMX (PBKDF2-HMAC-SHA1 + AES-256-CBC) | Full-Disk Encryption


(FDE)

14600 | LUKS v1 (legacy) | Full-Disk Encryption (FDE)

29541 | LUKS v1 RIPEMD-160 + AES | Full-Disk Encryption (FDE)

29542 | LUKS v1 RIPEMD-160 + Serpent | Full-Disk Encryption (FDE)

29543 | LUKS v1 RIPEMD-160 + Twofish | Full-Disk Encryption (FDE)

29511 | LUKS v1 SHA-1 + AES | Full-Disk Encryption (FDE)

29512 | LUKS v1 SHA-1 + Serpent | Full-Disk Encryption (FDE)

29513 | LUKS v1 SHA-1 + Twofish | Full-Disk Encryption (FDE)

29521 | LUKS v1 SHA-256 + AES | Full-Disk Encryption (FDE)

29522 | LUKS v1 SHA-256 + Serpent | Full-Disk Encryption (FDE)

29523 | LUKS v1 SHA-256 + Twofish | Full-Disk Encryption (FDE)

29531 | LUKS v1 SHA-512 + AES | Full-Disk Encryption (FDE)

29532 | LUKS v1 SHA-512 + Serpent | Full-Disk Encryption (FDE)

29533 | LUKS v1 SHA-512 + Twofish | Full-Disk Encryption (FDE)

13711 | VeraCrypt RIPEMD160 + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)

13712 | VeraCrypt RIPEMD160 + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)

13713 | VeraCrypt RIPEMD160 + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)

13741 | VeraCrypt RIPEMD160 + XTS 512 bit + boot-mode (legacy) | Full-Disk Encryption
(FDE)

13742 | VeraCrypt RIPEMD160 + XTS 1024 bit + boot-mode (legacy) | Full-Disk Encryption
(FDE)
13743 | VeraCrypt RIPEMD160 + XTS 1536 bit + boot-mode (legacy) | Full-Disk Encryption
(FDE)

29411 | VeraCrypt RIPEMD160 + XTS 512 bit | Full-Disk Encryption (FDE)

29412 | VeraCrypt RIPEMD160 + XTS 1024 bit | Full-Disk Encryption (FDE)

29413 | VeraCrypt RIPEMD160 + XTS 1536 bit | Full-Disk Encryption (FDE)

29441 | VeraCrypt RIPEMD160 + XTS 512 bit + boot-mode | Full-Disk Encryption (FDE)

29442 | VeraCrypt RIPEMD160 + XTS 1024 bit + boot-mode | Full-Disk Encryption (FDE)

29443 | VeraCrypt RIPEMD160 + XTS 1536 bit + boot-mode | Full-Disk Encryption (FDE)

13751 | VeraCrypt SHA256 + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)

13752 | VeraCrypt SHA256 + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)

13753 | VeraCrypt SHA256 + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)

13761 | VeraCrypt SHA256 + XTS 512 bit + boot-mode (legacy) | Full-Disk Encryption
(FDE)

13762 | VeraCrypt SHA256 + XTS 1024 bit + boot-mode (legacy) | Full-Disk Encryption
(FDE)

13763 | VeraCrypt SHA256 + XTS 1536 bit + boot-mode (legacy) | Full-Disk Encryption
(FDE)

29451 | VeraCrypt SHA256 + XTS 512 bit | Full-Disk Encryption (FDE)

29452 | VeraCrypt SHA256 + XTS 1024 bit | Full-Disk Encryption (FDE)

29453 | VeraCrypt SHA256 + XTS 1536 bit | Full-Disk Encryption (FDE)

29461 | VeraCrypt SHA256 + XTS 512 bit + boot-mode | Full-Disk Encryption (FDE)

29462 | VeraCrypt SHA256 + XTS 1024 bit + boot-mode | Full-Disk Encryption (FDE)

29463 | VeraCrypt SHA256 + XTS 1536 bit + boot-mode | Full-Disk Encryption (FDE)

13721 | VeraCrypt SHA512 + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)

13722 | VeraCrypt SHA512 + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)

13723 | VeraCrypt SHA512 + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)

29421 | VeraCrypt SHA512 + XTS 512 bit | Full-Disk Encryption (FDE)

29422 | VeraCrypt SHA512 + XTS 1024 bit | Full-Disk Encryption (FDE)

29423 | VeraCrypt SHA512 + XTS 1536 bit | Full-Disk Encryption (FDE)

13771 | VeraCrypt Streebog-512 + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)

13772 | VeraCrypt Streebog-512 + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)

13773 | VeraCrypt Streebog-512 + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)
13781 | VeraCrypt Streebog-512 + XTS 512 bit + boot-mode (legacy) | Full-Disk Encryption
(FDE)

13782 | VeraCrypt Streebog-512 + XTS 1024 bit + boot-mode (legacy) | Full-Disk Encryption
(FDE)

13783 | VeraCrypt Streebog-512 + XTS 1536 bit + boot-mode (legacy) | Full-Disk Encryption
(FDE)

29471 | VeraCrypt Streebog-512 + XTS 512 bit | Full-Disk Encryption (FDE)

29472 | VeraCrypt Streebog-512 + XTS 1024 bit | Full-Disk Encryption (FDE)

29473 | VeraCrypt Streebog-512 + XTS 1536 bit | Full-Disk Encryption (FDE)

29481 | VeraCrypt Streebog-512 + XTS 512 bit + boot-mode | Full-Disk Encryption (FDE)

29482 | VeraCrypt Streebog-512 + XTS 1024 bit + boot-mode | Full-Disk Encryption (FDE)

29483 | VeraCrypt Streebog-512 + XTS 1536 bit + boot-mode | Full-Disk Encryption (FDE)

13731 | VeraCrypt Whirlpool + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)

13732 | VeraCrypt Whirlpool + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)

13733 | VeraCrypt Whirlpool + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)

29431 | VeraCrypt Whirlpool + XTS 512 bit | Full-Disk Encryption (FDE)

29432 | VeraCrypt Whirlpool + XTS 1024 bit | Full-Disk Encryption (FDE)

29433 | VeraCrypt Whirlpool + XTS 1536 bit | Full-Disk Encryption (FDE)

23900 | BestCrypt v3 Volume Encryption | Full-Disk Encryption (FDE)

16700 | FileVault 2 | Full-Disk Encryption (FDE)

27500 | VirtualBox (PBKDF2-HMAC-SHA256 & AES-128-XTS) | Full-Disk Encryption


(FDE)

27600 | VirtualBox (PBKDF2-HMAC-SHA256 & AES-256-XTS) | Full-Disk Encryption


(FDE)

20011 | DiskCryptor SHA512 + XTS 512 bit | Full-Disk Encryption (FDE)

20012 | DiskCryptor SHA512 + XTS 1024 bit | Full-Disk Encryption (FDE)

20013 | DiskCryptor SHA512 + XTS 1536 bit | Full-Disk Encryption (FDE)

22100 | BitLocker | Full-Disk Encryption (FDE)

12900 | Android FDE (Samsung DEK) | Full-Disk Encryption (FDE)

8800 | Android FDE <= 4.3 | Full-Disk Encryption (FDE)

18300 | Apple File System (APFS) | Full-Disk Encryption (FDE)

6211 | TrueCrypt RIPEMD160 + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)

6212 | TrueCrypt RIPEMD160 + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)
6213 | TrueCrypt RIPEMD160 + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)

6241 | TrueCrypt RIPEMD160 + XTS 512 bit + boot-mode (legacy) | Full-Disk Encryption
(FDE)

6242 | TrueCrypt RIPEMD160 + XTS 1024 bit + boot-mode (legacy) | Full-Disk Encryption
(FDE)

6243 | TrueCrypt RIPEMD160 + XTS 1536 bit + boot-mode (legacy) | Full-Disk Encryption
(FDE)

29311 | TrueCrypt RIPEMD160 + XTS 512 bit | Full-Disk Encryption (FDE)

29312 | TrueCrypt RIPEMD160 + XTS 1024 bit | Full-Disk Encryption (FDE)

29313 | TrueCrypt RIPEMD160 + XTS 1536 bit | Full-Disk Encryption (FDE)

29341 | TrueCrypt RIPEMD160 + XTS 512 bit + boot-mode | Full-Disk Encryption (FDE)

29342 | TrueCrypt RIPEMD160 + XTS 1024 bit + boot-mode | Full-Disk Encryption (FDE)

29343 | TrueCrypt RIPEMD160 + XTS 1536 bit + boot-mode | Full-Disk Encryption (FDE)

6221 | TrueCrypt SHA512 + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)

6222 | TrueCrypt SHA512 + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)

6223 | TrueCrypt SHA512 + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)

29321 | TrueCrypt SHA512 + XTS 512 bit | Full-Disk Encryption (FDE)

29322 | TrueCrypt SHA512 + XTS 1024 bit | Full-Disk Encryption (FDE)

29323 | TrueCrypt SHA512 + XTS 1536 bit | Full-Disk Encryption (FDE)

6231 | TrueCrypt Whirlpool + XTS 512 bit (legacy) | Full-Disk Encryption (FDE)

6232 | TrueCrypt Whirlpool + XTS 1024 bit (legacy) | Full-Disk Encryption (FDE)

6233 | TrueCrypt Whirlpool + XTS 1536 bit (legacy) | Full-Disk Encryption (FDE)

29331 | TrueCrypt Whirlpool + XTS 512 bit | Full-Disk Encryption (FDE)

29332 | TrueCrypt Whirlpool + XTS 1024 bit | Full-Disk Encryption (FDE)

29333 | TrueCrypt Whirlpool + XTS 1536 bit | Full-Disk Encryption (FDE)

12200 | eCryptfs | Full-Disk Encryption (FDE)

10400 | PDF 1.1 - 1.3 (Acrobat 2 - 4) | Document

10410 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #1 | Document

10420 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #2 | Document

10500 | PDF 1.4 - 1.6 (Acrobat 5 - 8) | Document

25400 | PDF 1.4 - 1.6 (Acrobat 5 - 8) - user and owner pass | Document

10600 | PDF 1.7 Level 3 (Acrobat 9) | Document


10700 | PDF 1.7 Level 8 (Acrobat 10 - 11) | Document

9400 | MS Office 2007 | Document

9500 | MS Office 2010 | Document

9600 | MS Office 2013 | Document

25300 | MS Office 2016 - SheetProtection | Document

9700 | MS Office <= 2003 $0/$1, MD5 + RC4 | Document

9710 | MS Office <= 2003 $0/$1, MD5 + RC4, collider #1 | Document

9720 | MS Office <= 2003 $0/$1, MD5 + RC4, collider #2 | Document

9810 | MS Office <= 2003 $3, SHA1 + RC4, collider #1 | Document

9820 | MS Office <= 2003 $3, SHA1 + RC4, collider #2 | Document

9800 | MS Office <= 2003 $3/$4, SHA1 + RC4 | Document

18400 | Open Document Format (ODF) 1.2 (SHA-256, AES) | Document

18600 | Open Document Format (ODF) 1.1 (SHA-1, Blowfish) | Document

16200 | Apple Secure Notes | Document

23300 | Apple iWork | Document

6600 | 1Password, agilekeychain | Password Manager

8200 | 1Password, cloudkeychain | Password Manager

9000 | Password Safe v2 | Password Manager

5200 | Password Safe v3 | Password Manager

6800 | LastPass + LastPass sniffed | Password Manager

13400 | KeePass 1 (AES/Twofish) and KeePass 2 (AES) | Password Manager

29700 | KeePass 1 (AES/Twofish) and KeePass 2 (AES) - keyfile only mode | Password
Manager

23400 | Bitwarden | Password Manager

16900 | Ansible Vault | Password Manager

26000 | Mozilla key3.db | Password Manager

26100 | Mozilla key4.db | Password Manager

23100 | Apple Keychain | Password Manager

11600 | 7-Zip | Archive

12500 | RAR3-hp | Archive

23800 | RAR3-p (Compressed) | Archive


23700 | RAR3-p (Uncompressed) | Archive

13000 | RAR5 | Archive

17220 | PKZIP (Compressed Multi-File) | Archive

17200 | PKZIP (Compressed) | Archive

17225 | PKZIP (Mixed Multi-File) | Archive

17230 | PKZIP (Mixed Multi-File Checksum-Only) | Archive

17210 | PKZIP (Uncompressed) | Archive

20500 | PKZIP Master Key | Archive

20510 | PKZIP Master Key (6 byte optimization) | Archive

23001 | SecureZIP AES-128 | Archive

23002 | SecureZIP AES-192 | Archive

23003 | SecureZIP AES-256 | Archive

13600 | WinZip | Archive

18900 | Android Backup | Archive

24700 | Stuffit5 | Archive

13200 | AxCrypt 1 | Archive

13300 | AxCrypt 1 in-memory SHA1 | Archive

23500 | AxCrypt 2 AES-128 | Archive

23600 | AxCrypt 2 AES-256 | Archive

14700 | iTunes backup < 10.0 | Archive

14800 | iTunes backup >= 10.0 | Archive

8400 | WBB3 (Woltlab Burning Board) | Forums, CMS, E-Commerce

2612 | PHPS | Forums, CMS, E-Commerce

121 | SMF (Simple Machines Forum) > v1.1 | Forums, CMS, E-Commerce

3711 | MediaWiki B type | Forums, CMS, E-Commerce

4521 | Redmine | Forums, CMS, E-Commerce

24800 | Umbraco HMAC-SHA1 | Forums, CMS, E-Commerce

11 | Joomla < 2.5.18 | Forums, CMS, E-Commerce

13900 | OpenCart | Forums, CMS, E-Commerce

11000 | PrestaShop | Forums, CMS, E-Commerce

16000 | Tripcode | Forums, CMS, E-Commerce


7900 | Drupal7 | Forums, CMS, E-Commerce

4522 | PunBB | Forums, CMS, E-Commerce

2811 | MyBB 1.2+, IPB2+ (Invision Power Board) | Forums, CMS, E-Commerce

2611 | vBulletin < v3.8.5 | Forums, CMS, E-Commerce

2711 | vBulletin >= v3.8.5 | Forums, CMS, E-Commerce

25600 | bcrypt(md5($pass)) / bcryptmd5 | Forums, CMS, E-Commerce

25800 | bcrypt(sha1($pass)) / bcryptsha1 | Forums, CMS, E-Commerce

28400 | bcrypt(sha512($pass)) / bcryptsha512 | Forums, CMS, E-Commerce

21 | osCommerce, xt:Commerce | Forums, CMS, E-Commerce

18100 | TOTP (HMAC-SHA1) | One-Time Password

2000 | STDOUT | Plaintext

99999 | Plaintext | Plaintext

21600 | Web2py pbkdf2-sha512 | Framework

10000 | Django (PBKDF2-SHA256) | Framework

124 | Django (SHA-1) | Framework

12001 | Atlassian (PBKDF2-HMAC-SHA1) | Framework

19500 | Ruby on Rails Restful-Authentication | Framework

27200 | Ruby on Rails Restful Auth (one round, no sitekey) | Framework

30000 | Python Werkzeug MD5 (HMAC-MD5 (key = $salt)) | Framework

30120 | Python Werkzeug SHA256 (HMAC-SHA256 (key = $salt)) | Framework

20200 | Python passlib pbkdf2-sha512 | Framework

20300 | Python passlib pbkdf2-sha256 | Framework

20400 | Python passlib pbkdf2-sha1 | Framework

24410 | PKCS#8 Private Keys (PBKDF2-HMAC-SHA1 + 3DES/AES) | Private Key

24420 | PKCS#8 Private Keys (PBKDF2-HMAC-SHA256 + 3DES/AES) | Private Key

15500 | JKS Java Key Store Private Keys (SHA1) | Private Key

22911 | RSA/DSA/EC/OpenSSH Private Keys ($0$) | Private Key

22921 | RSA/DSA/EC/OpenSSH Private Keys ($6$) | Private Key

22931 | RSA/DSA/EC/OpenSSH Private Keys ($1, $3$) | Private Key

22941 | RSA/DSA/EC/OpenSSH Private Keys ($4$) | Private Key

22951 | RSA/DSA/EC/OpenSSH Private Keys ($5$) | Private Key


23200 | XMPP SCRAM PBKDF2-SHA1 | Instant Messaging Service

28300 | Teamspeak 3 (channel hash) | Instant Messaging Service

22600 | Telegram Desktop < v2.1.14 (PBKDF2-HMAC-SHA1) | Instant Messaging


Service

24500 | Telegram Desktop >= v2.1.14 (PBKDF2-HMAC-SHA512) | Instant Messaging


Service

22301 | Telegram Mobile App Passcode (SHA256) | Instant Messaging Service

23 | Skype | Instant Messaging Service

29600 | Terra Station Wallet (AES256-CBC(PBKDF2($pass))) | Cryptocurrency Wallet

26600 | MetaMask Wallet | Cryptocurrency Wallet

21000 | BitShares v0.x - sha512(sha512_bin(pass)) | Cryptocurrency Wallet

28501 | Bitcoin WIF private key (P2PKH), compressed | Cryptocurrency Wallet

28502 | Bitcoin WIF private key (P2PKH), uncompressed | Cryptocurrency Wallet

28503 | Bitcoin WIF private key (P2WPKH, Bech32), compressed | Cryptocurrency Wallet

28504 | Bitcoin WIF private key (P2WPKH, Bech32), uncompressed | Cryptocurrency Wallet

28505 | Bitcoin WIF private key (P2SH(P2WPKH)), compressed | Cryptocurrency Wallet

28506 | Bitcoin WIF private key (P2SH(P2WPKH)), uncompressed | Cryptocurrency Wallet

11300 | Bitcoin/Litecoin wallet.dat | Cryptocurrency Wallet

16600 | Electrum Wallet (Salt-Type 1-3) | Cryptocurrency Wallet

21700 | Electrum Wallet (Salt-Type 4) | Cryptocurrency Wallet

21800 | Electrum Wallet (Salt-Type 5) | Cryptocurrency Wallet

12700 | Blockchain, My Wallet | Cryptocurrency Wallet

15200 | Blockchain, My Wallet, V2 | Cryptocurrency Wallet

18800 | Blockchain, My Wallet, Second Password (SHA256) | Cryptocurrency Wallet

25500 | Stargazer Stellar Wallet XLM | Cryptocurrency Wallet

16300 | Ethereum Pre-Sale Wallet, PBKDF2-HMAC-SHA256 | Cryptocurrency Wallet

15600 | Ethereum Wallet, PBKDF2-HMAC-SHA256 | Cryptocurrency Wallet

15700 | Ethereum Wallet, SCRYPT | Cryptocurrency Wallet

22500 | MultiBit Classic .key (MD5) | Cryptocurrency Wallet

27700 | MultiBit Classic .wallet (scrypt) | Cryptocurrency Wallet

22700 | MultiBit HD (scrypt) | Cryptocurrency Wallet

28200 | Exodus Desktop Wallet (scrypt) | Cryptocurrency Wallet


- [ Brain Client Features ] -

# | Features

===+========

1 | Send hashed passwords

2 | Send attack positions

3 | Send hashed passwords and attack positions

- [ Outfile Formats ] -

# | Format

===+========

1 | hash[:salt]

2 | plain

3 | hex_plain

4 | crack_pos

5 | timestamp absolute

6 | timestamp relative

- [ Rule Debugging Modes ] -

# | Format

===+========

1 | Finding-Rule

2 | Original-Word

3 | Original-Word:Finding-Rule

4 | Original-Word:Finding-Rule:Processed-Word

5 | Original-Word:Finding-Rule:Processed-Word:Wordlist

- [ Attack Modes ] -
# | Mode

===+======

0 | Straight

1 | Combination

3 | Brute-force

6 | Hybrid Wordlist + Mask

7 | Hybrid Mask + Wordlist

9 | Association

- [ Built-in Charsets ] -

? | Charset

===+=========

l | abcdefghijklmnopqrstuvwxyz [a-z]

u | ABCDEFGHIJKLMNOPQRSTUVWXYZ [A-Z]

d | 0123456789 [0-9]

h | 0123456789abcdef [0-9a-f]

H | 0123456789ABCDEF [0-9A-F]

s | !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~

a | ?l?u?d?s

b | 0x00 - 0xff

- [ OpenCL Device Types ] -

# | Device Type

===+=============

1 | CPU

2 | GPU

3 | FPGA, DSP, Co-Processor


- [ Workload Profiles ] -

# | Performance | Runtime | Power Consumption | Desktop Impact

===+=============+=========+===================+=================

1 | Low | 2 ms | Low | Minimal

2 | Default | 12 ms | Economic | Noticeable

3 | High | 96 ms | High | Unresponsive

4 | Nightmare | 480 ms | Insane | Headless

- [ License ] -

hashcat is licensed under the MIT license

Copyright and license terms are listed in docs/license.txt

- [ Basic Examples ] -

Attack- | Hash- |

Mode | Type | Example command

==================+=======+==================================================
================

Wordlist | $P$ | hashcat -a 0 -m 400 example400.hash example.dict

Wordlist + Rules | MD5 | hashcat -a 0 -m 0 example0.hash example.dict -r rules/best64.rule

Brute-Force | MD5 | hashcat -a 3 -m 0 example0.hash ?a?a?a?a?a?a

Combinator | MD5 | hashcat -a 1 -m 0 example0.hash example.dict example.dict

Association | $1$ | hashcat -a 9 -m 500 example500.hash 1word.dict -r rules/best64.rule

If you still have no idea what just happened, try the following pages:

* https://hashcat.net/wiki/#howtos_videos_papers_articles_etc_in_the_wild

* https://hashcat.net/faq/
If you think you need help by a real human come to the hashcat Discord:

* https://hashcat.net/discord

C:\Users\TXX\Desktop\hashcat-6.2.6>^S

You might also like