• 用Hashcat每秒计算1.4亿个密码,破解隔壁WIFI密码


      Hashcat是啥

      Hashcat是什么呢?Hashcat是当前最强大的开源密码恢复工具,你可以访问Hashcat.net网站来了解这款工具的详细情况。本质上,Hashcat 3.0是一款高级密码恢复工具,可以利用CPU或GPU资源来攻击160多种哈希类型的密码

      计算机环境准备

      本地的测试系统为Mac

      需要把airodump抓到的 4 次握手文件转换为hccap的格式

      txt格式的字典文件

      Hashcat和aircrack-ng的对比

      使用aricrack-ng暴力破解8位数密码需要50个小时, 但是使用Hashcat只要1个半小时不到

      使用aircrac-ng破解密码的时候计算机会爆卡, 内存占用100%是常事, 使用Hashcat破解的时候计算机一点都不卡, Hashcat不但支持CPU破解,还支持GPU破解,利用显卡的计算能力进行极速破解,简直666

      即使使用普通的CPU或GPU,每秒也能够生成1.35亿个哈希值, 我这台电脑是Mac Air,破解8位数字需要随机组合68719476736个数字, 这个是千万级别的数字, 使用Hashcat破解只需要1小时40分钟, 平均一秒钟计算1.4个亿密码

      Hashcat的安装

      先把github上面的源码down到本地:

    git clone https://github.com/hashcat/hashcat.git

      然后生成项目:

    cd hashcat //进入目录
    sudo make 
    sudo make install //安装hashcat

      如果安装成功, 在命令行输入hashcat,即可看到帮助文档:

    hashcat, advanced password recovery
    
    Usage: hashcat [options]... hash|hashfile|hccapfile [dictionary|mask|directory]...
    
    - [ Options ] -
    
     Options Short / Long          | Type | Description                                          | Example
    ===============================+======+======================================================+=======================
     -m, --hash-type               | Num  | Hash-type, see references below                      | -m 1000
     -a, --attack-mode             | Num  | Attack-mode, see references below                    | -a 3
     -V, --version                 |      | Print version                                        |
     -h, --help                    |      | Print help                                           |
         --quiet                   |      | Suppress output                                      |
         --hex-charset             |      | Assume charset is given in hex                       |
         --hex-salt                |      | Assume salt is given in hex                          |
         --hex-wordlist            |      | Assume words in wordlist is given in hex             |
         --force                   |      | Ignore warnings                                      |
         --status                  |      | Enable automatic update of the status-screen         |
         --status-timer            | Num  | Sets seconds between status-screen update to X       | --status-timer=1
         --machine-readable        |      | Display the status view in a machine readable format |
         --keep-guessing           |      | Keep guessing the hash after it has been cracked     |
         --loopback                |      | Add new plains to induct directory                   |
         --weak-hash-threshold     | Num  | Threshold X when to stop checking for weak hashes    | --weak=0
         --markov-hcstat           | File | Specify hcstat file to use                           | --markov-hc=my.hcstat
         --markov-disable          |      | Disables markov-chains, emulates classic brute-force |
         --markov-classic          |      | Enables classic markov-chains, no per-position       |
     -t, --markov-threshold        | Num  | Threshold X when to stop accepting new markov-chains | -t 50
         --runtime                 | Num  | Abort session after X seconds of runtime             | --runtime=10
         --session                 | Str  | Define specific session name                         | --session=mysession
         --restore                 |      | Restore session from --session                       |
         --restore-disable         |      | Do not write restore file                            |
         --restore-file-path       | File | Specific path to restore file                        | --restore-file-path=my.restore
     -o, --outfile                 | File | Define outfile for recovered hash                    | -o outfile.txt
         --outfile-format          | Num  | Define outfile-format X for recovered hash           | --outfile-format=7
         --outfile-autohex-disable |      | Disable the use of $HEX[] in output plains           |
         --outfile-check-timer     | Num  | Sets seconds between outfile checks to X             | --outfile-check=30
     -p, --separator               | Char | Separator char for hashlists and outfile             | -p :
         --stdout                  |      | Do not crack a hash, instead print candidates only   |
         --show                    |      | Compare hashlist with potfile; Show cracked hashes   |
         --left                    |      | Compare hashlist with potfile; Show uncracked hashes |
         --username                |      | Enable ignoring of usernames in hashfile             |
         --remove                  |      | Enable remove of hash once it is cracked             |
         --remove-timer            | Num  | Update input hash file each X seconds                | --remove-timer=30
         --potfile-disable         |      | Do not write potfile                                 |
         --potfile-path            | Dir  | Specific path to potfile                             | --potfile-path=my.pot
         --debug-mode              | Num  | Defines the debug mode (hybrid only by using rules)  | --debug-mode=4
         --debug-file              | File | Output file for debugging rules                      | --debug-file=good.log
         --induction-dir           | Dir  | Specify the induction directory to use for loopback  | --induction=inducts
         --outfile-check-dir       | Dir  | Specify the outfile directory to monitor for plains  | --outfile-check-dir=x
         --logfile-disable         |      | Disable the logfile                                  |
         --truecrypt-keyfiles      | File | Keyfiles used, separate with comma                   | --truecrypt-key=x.png
         --veracrypt-keyfiles      | File | Keyfiles used, separate with comma                   | --veracrypt-key=x.txt
         --veracrypt-pim           | Num  | VeraCrypt personal iterations multiplier             | --veracrypt-pim=1000
     -b, --benchmark               |      | Run benchmark                                        |
         --speed-only              |      | Return expected speed of the attack and quit         |
         --progress-only           |      | Return ideal progress step size and time to process  |
     -c, --segment-size            | Num  | Sets size in MB to cache from the wordfile to X      | -c 32
         --bitmap-min              | Num  | Sets minimum bits allowed for bitmaps to X           | --bitmap-min=24
         --bitmap-max              | Num  | Sets maximum bits allowed for bitmaps to X           | --bitmap-max=24
         --cpu-affinity            | Str  | Locks to CPU devices, separate with comma            | --cpu-affinity=1,2,3
     -I, --opencl-info             |      | Show info about OpenCL platforms/devices detected    | -I
         --opencl-platforms        | Str  | OpenCL platforms to use, separate with comma         | --opencl-platforms=2
     -d, --opencl-devices          | Str  | OpenCL devices to use, separate with comma           | -d 1
     -D, --opencl-device-types     | Str  | OpenCL device-types to use, separate with comma      | -D 1
         --opencl-vector-width     | Num  | Manual override OpenCL vector-width to X             | --opencl-vector=4
     -w, --workload-profile        | Num  | Enable a specific workload profile, see pool below   | -w 3
     -n, --kernel-accel            | Num  | Manual workload tuning, set outerloop step size to X | -n 64
     -u, --kernel-loops            | Num  | Manual workload tuning, set innerloop step size to X | -u 256
         --nvidia-spin-damp        | Num  | Workaround NVidias CPU burning loop bug, in percent  | --nvidia-spin-damp=50
         --gpu-temp-disable        |      | Disable temperature and fanspeed reads and triggers  |
         --gpu-temp-abort          | Num  | Abort if GPU temperature reaches X degrees celsius   | --gpu-temp-abort=100
         --gpu-temp-retain         | Num  | Try to retain GPU temperature at X degrees celsius   | --gpu-temp-retain=95
         --powertune-enable        |      | Enable power tuning, restores settings when finished |
         --scrypt-tmto             | Num  | Manually override TMTO value for scrypt to X         | --scrypt-tmto=3
     -s, --skip                    | Num  | Skip X words from the start                          | -s 1000000
     -l, --limit                   | Num  | Limit X words from the start + skipped words         | -l 1000000
         --keyspace                |      | Show keyspace base:mod values and quit               |
     -j, --rule-left               | Rule | Single rule applied to each word from left wordlist  | -j 'c'
     -k, --rule-right              | Rule | Single rule applied to each word from right wordlist | -k '^-'
     -r, --rules-file              | File | Multiple rules applied to each word from wordlists   | -r rules/best64.rule
     -g, --generate-rules          | Num  | Generate X random rules                              | -g 10000
         --generate-rules-func-min | Num  | Force min X funcs per rule                           |
         --generate-rules-func-max | Num  | Force max X funcs per rule                           |
         --generate-rules-seed     | Num  | Force RNG seed set to X                              |
     -1, --custom-charset1         | CS   | User-defined charset ?1                              | -1 ?l?d?u
     -2, --custom-charset2         | CS   | User-defined charset ?2                              | -2 ?l?d?s
     -3, --custom-charset3         | CS   | User-defined charset ?3                              |
     -4, --custom-charset4         | CS   | User-defined charset ?4                              |
     -i, --increment               |      | Enable mask increment mode                           |
         --increment-min           | Num  | Start mask incrementing at X                         | --increment-min=4
         --increment-max           | Num  | Stop mask incrementing at X                          | --increment-max=8
    
    - [ Hash modes ] -
    
          # | Name                                             | Category
      ======+==================================================+======================================
        900 | MD4                                              | Raw Hash
          0 | MD5                                              | Raw Hash
       5100 | Half MD5                                         | Raw Hash
        100 | SHA1                                             | Raw Hash
       1300 | SHA-224                                          | Raw Hash
       1400 | SHA-256                                          | Raw Hash
      10800 | SHA-384                                          | Raw Hash
       1700 | SHA-512                                          | Raw Hash
       5000 | SHA-3(Keccak)                                    | Raw Hash
      10100 | SipHash                                          | Raw Hash
       6000 | RipeMD160                                        | Raw Hash
       6100 | Whirlpool                                        | Raw Hash
       6900 | GOST R 34.11-94                                  | Raw Hash
      11700 | GOST R 34.11-2012 (Streebog) 256-bit             | Raw Hash
      11800 | GOST R 34.11-2012 (Streebog) 512-bit             | Raw Hash
         10 | md5($pass.$salt)                                 | Raw Hash, Salted and / or Iterated
         20 | md5($salt.$pass)                                 | Raw Hash, Salted and / or Iterated
         30 | md5(unicode($pass).$salt)                        | Raw Hash, Salted and / or Iterated
         40 | md5($salt.unicode($pass))                        | Raw Hash, Salted and / or Iterated
       3800 | md5($salt.$pass.$salt)                           | Raw Hash, Salted and / or Iterated
       3710 | md5($salt.md5($pass))                            | Raw Hash, Salted and / or Iterated
       2600 | md5(md5($pass))                                  | Raw Hash, Salted and / or Iterated
       4300 | md5(strtoupper(md5($pass)))                      | Raw Hash, Salted and / or Iterated
       4400 | md5(sha1($pass))                                 | Raw Hash, Salted and / or Iterated
        110 | sha1($pass.$salt)                                | Raw Hash, Salted and / or Iterated
        120 | sha1($salt.$pass)                                | Raw Hash, Salted and / or Iterated
        130 | sha1(unicode($pass).$salt)                       | Raw Hash, Salted and / or Iterated
        140 | sha1($salt.unicode($pass))                       | Raw Hash, Salted and / or Iterated
       4500 | sha1(sha1($pass))                                | Raw Hash, Salted and / or Iterated
       4520 | sha1($salt.sha1($pass))                          | Raw Hash, Salted and / or Iterated
       4700 | sha1(md5($pass))                                 | Raw Hash, Salted and / or Iterated
       4900 | sha1($salt.$pass.$salt)                          | Raw Hash, Salted and / or Iterated
      14400 | sha1(CX)                                         | Raw Hash, Salted and / or Iterated
       1410 | sha256($pass.$salt)                              | Raw Hash, Salted and / or Iterated
       1420 | sha256($salt.$pass)                              | Raw Hash, Salted and / or Iterated
       1430 | sha256(unicode($pass).$salt)                     | Raw Hash, Salted and / or Iterated
       1440 | sha256($salt.unicode($pass))                     | Raw Hash, Salted and / or Iterated
       1710 | sha512($pass.$salt)                              | Raw Hash, Salted and / or Iterated
       1720 | sha512($salt.$pass)                              | Raw Hash, Salted and / or Iterated
       1730 | sha512(unicode($pass).$salt)                     | Raw Hash, Salted and / or Iterated
       1740 | sha512($salt.unicode($pass))                     | Raw Hash, Salted and / or Iterated
         50 | HMAC-MD5 (key = $pass)                           | Raw Hash, Authenticated
         60 | HMAC-MD5 (key = $salt)                           | Raw Hash, Authenticated
        150 | HMAC-SHA1 (key = $pass)                          | Raw Hash, Authenticated
        160 | HMAC-SHA1 (key = $salt)                          | Raw Hash, Authenticated
       1450 | HMAC-SHA256 (key = $pass)                        | Raw Hash, Authenticated
       1460 | HMAC-SHA256 (key = $salt)                        | Raw Hash, Authenticated
       1750 | HMAC-SHA512 (key = $pass)                        | Raw Hash, Authenticated
       1760 | HMAC-SHA512 (key = $salt)                        | Raw Hash, Authenticated
      14000 | DES (PT = $salt, key = $pass)                    | Raw Cipher, Known-Plaintext attack
      14100 | 3DES (PT = $salt, key = $pass)                   | Raw Cipher, Known-Plaintext attack
      14900 | Skip32 (PT = $salt, key = $pass)                 | Raw Cipher, Known-Plaintext attack
        400 | phpass                                           | Generic KDF
       8900 | scrypt                                           | Generic KDF
      11900 | PBKDF2-HMAC-MD5                                  | Generic KDF
      12000 | PBKDF2-HMAC-SHA1                                 | Generic KDF
      10900 | PBKDF2-HMAC-SHA256                               | Generic KDF
      12100 | PBKDF2-HMAC-SHA512                               | Generic KDF
         23 | Skype                                            | Network protocols
       2500 | WPA/WPA2                                         | Network protocols
       4800 | iSCSI CHAP authentication, MD5(Chap)             | Network protocols
       5300 | IKE-PSK MD5                                      | Network protocols
       5400 | IKE-PSK SHA1                                     | Network protocols
       5500 | NetNTLMv1                                        | Network protocols
       5500 | NetNTLMv1 + ESS                                  | Network protocols
       5600 | NetNTLMv2                                        | Network protocols
       7300 | IPMI2 RAKP HMAC-SHA1                             | Network protocols
       7500 | Kerberos 5 AS-REQ Pre-Auth etype 23              | Network protocols
       8300 | DNSSEC (NSEC3)                                   | Network protocols
      10200 | Cram MD5                                         | Network protocols
      11100 | PostgreSQL CRAM (MD5)                            | Network protocols
      11200 | MySQL CRAM (SHA1)                                | Network protocols
      11400 | SIP digest authentication (MD5)                  | Network protocols
      13100 | Kerberos 5 TGS-REP etype 23                      | Network protocols
        121 | SMF (Simple Machines Forum)                      | Forums, CMS, E-Commerce, Frameworks
        400 | phpBB3                                           | Forums, CMS, E-Commerce, Frameworks
       2611 | vBulletin < v3.8.5                               | Forums, CMS, E-Commerce, Frameworks
       2711 | vBulletin > v3.8.5                               | Forums, CMS, E-Commerce, Frameworks
       2811 | MyBB                                             | Forums, CMS, E-Commerce, Frameworks
       2811 | IPB (Invison Power Board)                        | Forums, CMS, E-Commerce, Frameworks
       8400 | WBB3 (Woltlab Burning Board)                     | Forums, CMS, E-Commerce, Frameworks
         11 | Joomla < 2.5.18                                  | Forums, CMS, E-Commerce, Frameworks
        400 | Joomla > 2.5.18                                  | Forums, CMS, E-Commerce, Frameworks
        400 | Wordpress                                        | Forums, CMS, E-Commerce, Frameworks
       2612 | PHPS                                             | Forums, CMS, E-Commerce, Frameworks
       7900 | Drupal7                                          | Forums, CMS, E-Commerce, Frameworks
         21 | osCommerce                                       | Forums, CMS, E-Commerce, Frameworks
         21 | xt:Commerce                                      | Forums, CMS, E-Commerce, Frameworks
      11000 | PrestaShop                                       | Forums, CMS, E-Commerce, Frameworks
        124 | Django (SHA-1)                                   | Forums, CMS, E-Commerce, Frameworks
      10000 | Django (PBKDF2-SHA256)                           | Forums, CMS, E-Commerce, Frameworks
       3711 | Mediawiki B type                                 | Forums, CMS, E-Commerce, Frameworks
      13900 | OpenCart                                         | Forums, CMS, E-Commerce, Frameworks
       4521 | Redmine                                          | Forums, CMS, E-Commerce, Frameworks
       4522 | PunBB                                            | Forums, CMS, E-Commerce, Frameworks
         12 | PostgreSQL                                       | Database Server
        131 | MSSQL(2000)                                      | Database Server
        132 | MSSQL(2005)                                      | Database Server
       1731 | MSSQL(2012)                                      | Database Server
       1731 | MSSQL(2014)                                      | Database Server
        200 | MySQL323                                         | Database Server
        300 | MySQL4.1/MySQL5                                  | Database Server
       3100 | Oracle H: Type (Oracle 7+)                       | Database Server
        112 | Oracle S: Type (Oracle 11+)                      | Database Server
      12300 | Oracle T: Type (Oracle 12+)                      | Database Server
       8000 | Sybase ASE                                       | Database Server
        141 | EPiServer 6.x < v4                               | HTTP, SMTP, LDAP Server
       1441 | EPiServer 6.x > v4                               | HTTP, SMTP, LDAP Server
       1600 | Apache $apr1$                                    | HTTP, SMTP, LDAP Server
      12600 | ColdFusion 10+                                   | HTTP, SMTP, LDAP Server
       1421 | hMailServer                                      | HTTP, SMTP, LDAP Server
        101 | nsldap, SHA-1(Base64), Netscape LDAP SHA         | HTTP, SMTP, LDAP Server
        111 | nsldaps, SSHA-1(Base64), Netscape LDAP SSHA      | HTTP, SMTP, LDAP Server
       1411 | SSHA-256(Base64), LDAP {SSHA256}                 | HTTP, SMTP, LDAP Server
       1711 | SSHA-512(Base64), LDAP {SSHA512}                 | HTTP, SMTP, LDAP Server
      11500 | CRC32                                            | Checksums
       3000 | LM                                               | Operating-Systems
       1000 | NTLM                                             | Operating-Systems
       1100 | Domain Cached Credentials (DCC), MS Cache        | Operating-Systems
       2100 | Domain Cached Credentials 2 (DCC2), MS Cache 2   | Operating-Systems
      12800 | MS-AzureSync PBKDF2-HMAC-SHA256                  | Operating-Systems
       1500 | descrypt, DES(Unix), Traditional DES             | Operating-Systems
      12400 | BSDiCrypt, Extended DES                          | Operating-Systems
        500 | md5crypt $1$, MD5(Unix)                          | Operating-Systems
       3200 | bcrypt $2*$, Blowfish(Unix)                      | Operating-Systems
       7400 | sha256crypt $5$, SHA256(Unix)                    | Operating-Systems
       1800 | sha512crypt $6$, SHA512(Unix)                    | Operating-Systems
        122 | OSX v10.4, OSX v10.5, OSX v10.6                  | Operating-Systems
       1722 | OSX v10.7                                        | Operating-Systems
       7100 | OSX v10.8, OSX v10.9, OSX v10.10                 | Operating-Systems
       6300 | AIX {smd5}                                       | Operating-Systems
       6700 | AIX {ssha1}                                      | Operating-Systems
       6400 | AIX {ssha256}                                    | Operating-Systems
       6500 | AIX {ssha512}                                    | Operating-Systems
       2400 | Cisco-PIX                                        | Operating-Systems
       2410 | Cisco-ASA                                        | Operating-Systems
        500 | Cisco-IOS $1$                                    | Operating-Systems
       5700 | Cisco-IOS $4$                                    | Operating-Systems
       9200 | Cisco-IOS $8$                                    | Operating-Systems
       9300 | Cisco-IOS $9$                                    | Operating-Systems
         22 | Juniper Netscreen/SSG (ScreenOS)                 | Operating-Systems
        501 | Juniper IVE                                      | Operating-Systems
       7000 | Fortigate (FortiOS)                              | Operating-Systems
       5800 | Android PIN                                      | Operating-Systems
      13800 | Windows 8+ phone PIN/Password                    | Operating-Systems
       8100 | Citrix Netscaler                                 | Operating-Systems
       8500 | RACF                                             | Operating-Systems
       7200 | GRUB 2                                           | Operating-Systems
       9900 | Radmin2                                          | Operating-Systems
        125 | ArubaOS                                          | Operating-Systems
       7700 | SAP CODVN B (BCODE)                              | Enterprise Application Software (EAS)
       7800 | SAP CODVN F/G (PASSCODE)                         | Enterprise Application Software (EAS)
      10300 | SAP CODVN H (PWDSALTEDHASH) iSSHA-1              | Enterprise Application Software (EAS)
       8600 | Lotus Notes/Domino 5                             | Enterprise Application Software (EAS)
       8700 | Lotus Notes/Domino 6                             | Enterprise Application Software (EAS)
       9100 | Lotus Notes/Domino 8                             | Enterprise Application Software (EAS)
        133 | PeopleSoft                                       | Enterprise Application Software (EAS)
      13500 | PeopleSoft Token                                 | Enterprise Application Software (EAS)
      11600 | 7-Zip                                            | Archives
      12500 | RAR3-hp                                          | Archives
      13000 | RAR5                                             | Archives
      13200 | AxCrypt                                          | Archives
      13300 | AxCrypt in memory SHA1                           | Archives
      13600 | WinZip                                           | Archives
      14700 | iTunes Backup < 10.0                             | Backup
      14800 | iTunes Backup >= 10.0                            | Backup
       62XY | TrueCrypt                                        | Full-Disk encryptions (FDE)
         X  | 1 = PBKDF2-HMAC-RipeMD160                        | Full-Disk encryptions (FDE)
         X  | 2 = PBKDF2-HMAC-SHA512                           | Full-Disk encryptions (FDE)
         X  | 3 = PBKDF2-HMAC-Whirlpool                        | Full-Disk encryptions (FDE)
         X  | 4 = PBKDF2-HMAC-RipeMD160 + boot-mode            | Full-Disk encryptions (FDE)
          Y | 1 = XTS  512 bit pure AES                        | Full-Disk encryptions (FDE)
          Y | 1 = XTS  512 bit pure Serpent                    | Full-Disk encryptions (FDE)
          Y | 1 = XTS  512 bit pure Twofish                    | Full-Disk encryptions (FDE)
          Y | 2 = XTS 1024 bit pure AES                        | Full-Disk encryptions (FDE)
          Y | 2 = XTS 1024 bit pure Serpent                    | Full-Disk encryptions (FDE)
          Y | 2 = XTS 1024 bit pure Twofish                    | Full-Disk encryptions (FDE)
          Y | 2 = XTS 1024 bit cascaded AES-Twofish            | Full-Disk encryptions (FDE)
          Y | 2 = XTS 1024 bit cascaded Serpent-AES            | Full-Disk encryptions (FDE)
          Y | 2 = XTS 1024 bit cascaded Twofish-Serpent        | Full-Disk encryptions (FDE)
          Y | 3 = XTS 1536 bit all                             | Full-Disk encryptions (FDE)
       8800 | Android FDE < v4.3                               | Full-Disk encryptions (FDE)
      12900 | Android FDE (Samsung DEK)                        | Full-Disk encryptions (FDE)
      12200 | eCryptfs                                         | Full-Disk encryptions (FDE)
      137XY | VeraCrypt                                        | Full-Disk encryptions (FDE)
         X  | 1 = PBKDF2-HMAC-RipeMD160                        | Full-Disk encryptions (FDE)
         X  | 2 = PBKDF2-HMAC-SHA512                           | Full-Disk encryptions (FDE)
         X  | 3 = PBKDF2-HMAC-Whirlpool                        | Full-Disk encryptions (FDE)
         X  | 4 = PBKDF2-HMAC-RipeMD160 + boot-mode            | Full-Disk encryptions (FDE)
         X  | 5 = PBKDF2-HMAC-SHA256                           | Full-Disk encryptions (FDE)
         X  | 6 = PBKDF2-HMAC-SHA256 + boot-mode               | Full-Disk encryptions (FDE)
          Y | 1 = XTS  512 bit pure AES                        | Full-Disk encryptions (FDE)
          Y | 1 = XTS  512 bit pure Serpent                    | Full-Disk encryptions (FDE)
          Y | 1 = XTS  512 bit pure Twofish                    | Full-Disk encryptions (FDE)
          Y | 2 = XTS 1024 bit pure AES                        | Full-Disk encryptions (FDE)
          Y | 2 = XTS 1024 bit pure Serpent                    | Full-Disk encryptions (FDE)
          Y | 2 = XTS 1024 bit pure Twofish                    | Full-Disk encryptions (FDE)
          Y | 2 = XTS 1024 bit cascaded AES-Twofish            | Full-Disk encryptions (FDE)
          Y | 2 = XTS 1024 bit cascaded Serpent-AES            | Full-Disk encryptions (FDE)
          Y | 2 = XTS 1024 bit cascaded Twofish-Serpent        | Full-Disk encryptions (FDE)
          Y | 3 = XTS 1536 bit all                             | Full-Disk encryptions (FDE)
      14600 | LUKS                                             | Full-Disk encryptions (FDE)
       9700 | MS Office <= 2003 $0|$1, MD5 + RC4               | Documents
       9710 | MS Office <= 2003 $0|$1, MD5 + RC4, collider #1  | Documents
       9720 | MS Office <= 2003 $0|$1, MD5 + RC4, collider #2  | Documents
       9800 | MS Office <= 2003 $3|$4, SHA1 + RC4              | Documents
       9810 | MS Office <= 2003 $3|$4, SHA1 + RC4, collider #1 | Documents
       9820 | MS Office <= 2003 $3|$4, SHA1 + RC4, collider #2 | Documents
       9400 | MS Office 2007                                   | Documents
       9500 | MS Office 2010                                   | Documents
       9600 | MS Office 2013                                   | Documents
      10400 | PDF 1.1 - 1.3 (Acrobat 2 - 4)                    | Documents
      10410 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #1       | Documents
      10420 | PDF 1.1 - 1.3 (Acrobat 2 - 4), collider #2       | Documents
      10500 | PDF 1.4 - 1.6 (Acrobat 5 - 8)                    | Documents
      10600 | PDF 1.7 Level 3 (Acrobat 9)                      | Documents
      10700 | PDF 1.7 Level 8 (Acrobat 10 - 11)                | Documents
       9000 | Password Safe v2                                 | Password Managers
       5200 | Password Safe v3                                 | Password Managers
       6800 | Lastpass + Lastpass sniffed                      | Password Managers
       6600 | 1Password, agilekeychain                         | Password Managers
       8200 | 1Password, cloudkeychain                         | Password Managers
      11300 | Bitcoin/Litecoin wallet.dat                      | Password Managers
      12700 | Blockchain, My Wallet                            | Password Managers
      13400 | Keepass 1 (AES/Twofish) and Keepass 2 (AES)      | Password Managers
      99999 | Plaintext                                        | Plaintext
    
    - [ Outfile Formats ] -
    
      # | Format
     ===+========
      1 | hash[:salt]
      2 | plain
      3 | hash[:salt]:plain
      4 | hex_plain
      5 | hash[:salt]:hex_plain
      6 | plain:hex_plain
      7 | hash[:salt]:plain:hex_plain
      8 | crackpos
      9 | hash[:salt]:crack_pos
     10 | plain:crack_pos
     11 | hash[:salt]:plain:crack_pos
     12 | hex_plain:crack_pos
     13 | hash[:salt]:hex_plain:crack_pos
     14 | plain:hex_plain:crack_pos
     15 | hash[:salt]:plain:hex_plain:crack_pos
    
    - [ Rule Debugging Modes ] -
    
      # | Format
     ===+========
      1 | Finding-Rule
      2 | Original-Word
      3 | Original-Word:Finding-Rule
      4 | Original-Word:Finding-Rule:Processed-Word
    
    - [ Attack Modes ] -
    
      # | Mode
     ===+======
      0 | Straight
      1 | Combination
      3 | Brute-force
      6 | Hybrid Wordlist + Mask
      7 | Hybrid Mask + Wordlist
    
    - [ Built-in Charsets ] -
    
      ? | Charset
     ===+=========
      l | abcdefghijklmnopqrstuvwxyz
      u | ABCDEFGHIJKLMNOPQRSTUVWXYZ
      d | 0123456789
      h | 0123456789abcdef
      H | 0123456789ABCDEF
      s |  !"#$%&'()*+,-./:;<=>?@[]^_`{|}~
      a | ?l?u?d?s
      b | 0x00 - 0xff
    
    - [ OpenCL Device Types ] -
    
      # | Device Type
     ===+=============
      1 | CPU
      2 | GPU
      3 | FPGA, DSP, Co-Processor
    
    - [ Workload Profiles ] -
    
      # | Performance | Runtime | Power Consumption | Desktop Impact
     ===+=============+=========+===================+=================
      1 | Low         |   2 ms  | Low               | Minimal
      2 | Default     |  12 ms  | Economic          | Noticeable
      3 | High        |  96 ms  | High              | Unresponsive
      4 | Nightmare   | 480 ms  | Insane            | Headless
    
    - [ Basic Examples ] -
    
      Attack-          | Hash- |
      Mode             | Type  | Example command
     ==================+=======+==================================================================
      Wordlist         | $P$   | hashcat -a 0 -m 400 example400.hash example.dict
      Wordlist + Rules | MD5   | hashcat -a 0 -m 0 example0.hash example.dict -r rules/best64.rule
      Brute-Force      | MD5   | hashcat -a 3 -m 0 example0.hash ?a?a?a?a?a?a
      Combinator       | MD5   | hashcat -a 1 -m 0 example0.hash example.dict example.dict
    
    If you still have no idea what just happened try following pages:
    
    * https://hashcat.net/wiki/#howtos_videos_papers_articles_etc_in_the_wild
    * https://hashcat.net/wiki/#frequently_asked_questions
    View Code

      使用Hashcat破解WPA/PSK密码

      首先要把airodump抓取的cap文件转化为hccap格式, 可以在线转换, 在线转换的地址:https://hashcat.net/cap2hccap/, 也可以用aircrack-ng转换

    aircrack-ng <out.cap> -J <out.hccap>

      使用hashcat命令,第一个参数: -m 2500为破解的模式为WPA/PSK方式 ,第二个参数: hccap格式的文件是刚刚转化好的文件, 第三个参数: dics.txt为字典文件 :

    hashcat -m 2500 out.hccap.hccap  dics.txt

      破解的进度通过按键盘上的 s 键即可查看:

      破纯数字密码

    hashcat -m 2500 -a 3 handshake.hccap ?d?d?d?d?d?d?d?d

      ?d?d?d?d?d?d?d?d代表8为数字

      使用crunch生成字典破解

      kali系统中,通过crunch生成字典, 我要生成8位纯数字的字典,使用以下命令, 8 8 代表最小位数为8为, 第二个8代表最大位数也为8为, 0123456789为字典中的数字 , -o dic.txt说明要把字典生成到dic.txt, 生成的纯数字字典有900M:

    crunch 8 8  0123456789 -o dic.txt

      

      最后祝你好运,6666

      参考:

      hashcat官网:https://hashcat.net/hashcat/

      Cracking WPA/WPA2 with oclHashcat:https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2

      在线cap转为hccapx格式:https://hashcat.net/cap2hccapx/

      git:https://github.com/hashcat/hashcat

      0-9 8位纯数密码.rar:http://vdisk.weibo.com/s/v3c8-ph-6IAK/1438713183

    作者: NONO
    出处:http://www.cnblogs.com/diligenceday/
    企业网站:http://www.idrwl.com/
    开源博客:http://www.github.com/sqqihao
    QQ:287101329
    微信:18101055830 

  • 相关阅读:
    面试之求找两个数和为某个数、几个连续数等于某个数
    oracle 创建字段自增长——两种实现方式汇总
    UnityTestTools測试工具
    现代控制理论课件资料与说明
    教你轻松自己定义ViewPagerIndicator
    【Android】自己定义ListView的Adapter报空指针异常解决方法
    SICP-Exercise 1.5
    网络编程----------SOCKET编程实现简单的TCP协议
    字符串翻转
    机房收费系统重构(六)—泛型集合
  • 原文地址:https://www.cnblogs.com/diligenceday/p/6359661.html
Copyright © 2020-2023  润新知