当前位置: 代码网 > it编程>数据库>Mysql > 宇宙最快最高级且开源的密码破解利器 —— Hashcat

宇宙最快最高级且开源的密码破解利器 —— Hashcat

2024年08月01日 Mysql 我要评论
Hashcat 软件是一款非常强大的、开源的、号称世界上最快的密码破解软件,配合强大的字典,可以破译超过百分之九十的密码。Hashcat 目前支持各类公开算法高达240+类,市面上公开的密码加密算法基本都支持,有 Microsoft LM 哈希、MD4、MD5、SHA 系列,Unix 加密格式,MySQL 和 Cisco PIX 等!是安全测试中经常用到的密码解密神器之一。作为新手,可以使用 Hashcat 工具 CPU 模式破解,电脑机型高端可以使用 GPU 破解。内存的大小也影响工具破解的成功率。

目录

一. 前言

二. hashcat 安装

2.1. hashcat 官网下载

2.2. hash 类型识别工具 hashidentifier

2.3. john the ripper

三. hashcat 全部参数

3.1. hashcat 的攻击模式(-a 参数)

3.2. 输出格式(--outfile-format 参数)

3.3. 内置掩码字符集

3.4. hash 类型对照表(-m 参数)

3.5. 工作负载配置

四. hashcat 的常见使用案例

4.1. rar 文件解密

4.2. md5 密文解密

4.2.1. 字典模式破解

4.2.2. 掩码模式破解

4.2.3. 使用字典+掩码进行破解

4.2.4. 使用掩码+字典进行破解

4.2.5. 批量字典破解

4.3. sha512 密文解密

4.4. windows 密码解密

4.5. mysql 密码解密

4.6. office 密码解密

4.7. 在线解密


一. 前言

    hashcat 软件是一款非常强大的、开源的、号称世界上最快的密码破解软件,配合强大的字典,可以破译超过百分之九十的密码。hashcat 目前支持各类公开算法高达240+类,市面上公开的密码加密算法基本都支持,有 microsoft lm 哈希、md4、md5、sha 系列,unix 加密格式,mysql 和 cisco pix 等!是安全测试中经常用到的密码解密神器之一。

    作为新手,可以使用 hashcat 工具 cpu 模式破解,电脑机型高端可以使用 gpu 破解。内存的大小也影响工具破解的成功率。

二. hashcat 安装

2.1. hashcat 官网下载

建议从官网下载最新版本的 hashcat 压缩包:https://hashcat.net/hashcat/

解压目录如下:

该目录下的文件:

  • hashcat.exe:是64位操作系统上可以使用的可执行文件。
  • hashcat.potfile:是 hashcat 破解后密文、译文默认存储文件,只要解密过的 hash 密文都会被记录,后续相同密文就不需要再破解,直接从该文件中通过 --show 参数获取。
  • password.dict:是密码字典文件。

在该目录下 cmd 窗口中执行命令:hashcat -h

搞定,安装成功,为方便使用,可以配置该文件夹目录到系统环境变量 path 中,就可以在windows 任何目录下执行 hashcat 命令了。

2.2. hash 类型识别工具 hashidentifier

    可以使用 hashidentifier 识别数据的 hash 算法类型,hashidentifier 是 python 开发的工具,需要有 python3 的基础环境,下载压缩包,解压就可以使用。

2.3. john the ripper

    一款免费、开源的暴力密码破解器,它有多平台版本,支持目前大多数的加密算法,如 des、md4、md5 等。该软件破解密码方式简单而粗暴,理论上只要时间上面允许,该软件可以破译绝大多数用户密码。john the ripper 免费的开源软件,支持目前大多数的加密算法,如 des、md4、md5 等。它支持多种不同类型的系统架构,包括 unix、linux、windows、dos 模式、beos 和 openvms,主要目的是破解不够牢固的 unix/linux 系统密码。

下载地址:https://www.openwall.com/john/

三. hashcat 全部参数

选项全称选项简写类型描述示例
--hash-type-mnum指定要破解的hash类型,如果不指定类型,则默认是md5-m 1000
--attack-mode-anum指定要使用的破解模式,其值参考后面对参数。“-a 0”字典攻击,“-a 1” 组合攻击;“-a 3”掩码攻击。-a 3
--version-v查看版本信息
--help-h查看帮助信息
--quiet禁止输出
--hex-charset假设字符集是用十六进制给出的
--hex-salt假设salt是十六进制的
--hex-wordlist假设单词表中的单词是用十六进制表示的
--force忽略破解过程中的警告信息,跑单条hash可能需要加上此选项
--deprecated-check-disable启用不推荐使用的插件
--status启用状态屏幕的自动更新
--status-json为状态输出启用json格式
--status-timernum将状态屏幕更新之间的秒数设置为x--status-timer=1
--stdin-timeout-abortnum如果在x秒内没有来自stdin的输入,则中止--stdin-timeout-abort=300
--machine-readable以机器可读的格式显示状态视图
--keep-guessing破解后继续猜测散列
--self-test-disable启动时禁用自检功能
--loopback将新plains添加到导入目录
--markov-hcstat2file指定要使用的hcstat2文件--markov-hcstat2=my.hcstat2
--markov-disable禁用马尔可夫链,模仿经典暴力
--markov-classic启用经典马尔可夫链,无每个位置
--markov-inverse启用逆马尔可夫链,无每个位置
--markov-threshold-tnum阈值x何时停止接受新的马尔可夫链-t 50
--runtimenum运行x秒后中止会话--runtime=10
--sessionstr定义特定会话名称--session=mysession
--restore从--session还原会话
--restore-disable不写入还原文件
--restore-file-pathfile恢复文件的特定路径--restore-file-path=x.restore
--outfile-ofile为恢复的哈希定义输出文件-o outfile.txt
--outfile-formatstr要使用的完整文件格式,用逗号分隔--outfile-format=1,3
--outfile-autohex-disable禁止在输出平面中使用$hex[]
--outfile-check-timernum将输出文件检查之间的秒数设置为x--outfile-check-timer=30
--wordlist-autohex-disable禁用单词列表中$hex[]的转换
--separator-pchar哈希列表和输出文件的分隔符字符-p :
--stdout不要破解哈希,而是只打印候选者
--show将hashlist与potfile进行比较;显示破解的哈希
--left将hashlist与potfile进行比较;显示未破解的哈希
--username启用忽略哈希文件中的用户名
--remove一旦哈希被破解,就可以删除它们
--remove-timernum每x秒更新一次输入哈希文件--remove-timer=30
--potfile-disable不写入potfile
--potfile-pathfilepotfile的特定路径--potfile-path=my.pot
--encoding-fromcode强制从x进行内部单词表编码--encoding-from=iso-8859-15
--encoding-tocode强制内部单词表编码为x--encoding-to=utf-32le
--debug-modenum定义调试模式(仅通过使用规则混合)--debug-mode=4
--debug-filefile调试规则的输出文件--debug-file=good.log
--induction-dirdir指定用于环回的导入目录--induction=inducts
--outfile-check-dirdir指定要监视plains的输出文件目录--outfile-check-dir=x
--logfile-disable禁用日志文件
--hccapx-message-pairnum仅从匹配x的hccapx加载消息对--hccapx-message-pair=2
--nonce-error-correctionsnum替换ap的nonce最后字节的bf大小范围--nonce-error-corrections=16
--keyboard-layout-mappingfile特殊哈希模式的键盘布局映射表--keyb=german.hckmap
--truecrypt-keyfilesfile要使用的密钥文件,用逗号分隔--truecrypt-keyf=x.png
--veracrypt-keyfilesfile要使用的密钥文件,用逗号分隔--veracrypt-keyf=x.txt
--veracrypt-pim-startnumveracrypt个人迭代乘数启动--veracrypt-pim-start=450
--veracrypt-pim-stopnumveracrypt个人迭代乘数停止--veracrypt-pim-stop=500
--benchmark-b运行所选哈希模式的基准测试
--benchmark-all运行所有哈希模式的基准测试(需要-b)
--speed-only返回预期的攻击速度,然后退出
--progress-only返回理想的进度步长和处理时间
--segment-size-cnum将wordfile中缓存的大小(mb)设置为x-c 32
--bitmap-minnum将位图允许的最小位设置为x--bitmap-min=24
--bitmap-maxnum将位图允许的最大位设置为x--bitmap-max=24
--cpu-affinitystr锁定cpu设备,用逗号分隔--cpu-affinity=1,2,3
--hook-threadsnum设置挂钩的线程数(每个计算单元)--hook-threads=8
--hash-info显示每个哈希模式的信息
--example-hashes--hash-info的别名
--backend-ignore-cuda启动时不要尝试打开cuda接口
--backend-ignore-hip启动时不要尝试打开hip接口
--backend-ignore-metal启动时不要尝试打开metal接口
--backend-ignore-opencl启动时不要尝试打开opencl接口
--backend-info-i显示系统/环境/后端api信息-i or -ii
--backend-devices-dstr要使用的后端设备,用逗号分隔-d 1
--opencl-device-types-dstr要使用的opencl,用逗号分隔-d 1
--optimized-kernel-enable-o启用优化内核(限制密码长度)
--multiply-accel-disable-m禁用将内核加速与处理器计数相乘
--workload-profile-wnum启用特定的工作负载配置文件,请参阅下面的池,有4种选项-w 3
--kernel-accel-nnum手动工作负载调整,将outerloop步长设置为x-n 64
--kernel-loops-unum手动工作负载调整,将innerloop步长设置为x-u 256
--kernel-threads-tnum手动工作负载调整,将线程数设置为x-t 64
--backend-vector-widthnum手动将后端矢量宽度覆盖为x--backend-vector=4
--spin-dampnum使用cpu进行设备同步(百分比)--spin-damp=10
--hwmon-disable禁用温度和风扇转速读数和触发器
--hwmon-temp-abortnum如果温度达到x摄氏度,则中止--hwmon-temp-abort=100
--scrypt-tmtonum手动将scrypt的tmto值重写为x--scrypt-tmto=3
--skip-snum从开头跳过x个单词-s 1000000
--limit-lnum从开始限制x个单词+跳过的单词-l 1000000
--keyspace显示密钥空间基础:mod值并退出
--rule-left-jrule单个规则应用于左侧单词列表中的每个单词-j 'c'
--rule-right-krule单个规则应用于右侧单词列表中的每个单词-k '^-'
--rules-file-rfile使用自定义破解规则-r rules/best64.rule
--generate-rules-gnum生成x个随机规则-g 10000
--generate-rules-func-minnum强制每个规则至少x个函数
--generate-rules-func-maxnum强制每个规则至多x个函数
--generate-rules-func-selstr对随机规则引擎有效的规则运算符池--generate-rules-func-sel=iotlc
--generate-rules-seednum强制rng种子设置为x
--custom-charset1-1cs用户定义的字符集 ?1-1 ?l?d?u
--custom-charset2-2cs用户定义的字符集 ?2-2 ?l?d?s
--custom-charset3-3cs用户定义的字符集 ?3
--custom-charset4-4cs用户定义的字符集 ?4
--identify显示所有支持的输入哈希算法--identify my.hash
--increment-i启用掩码增量模式
--increment-minnum在x处开始掩码递增--increment-min=4
--increment-maxnum在x处停止掩码递增--increment-max=8
--slow-candidates-s启用较慢(但高级)的候选生成器
--brain-server启用大脑服务器
--brain-server-timernum每x秒更新一次大脑服务器转储(最小值:60)--brain-server-timer=300
--brain-client-z启用大脑客户端,激活-s
--brain-client-featuresnum定义大脑客户端功能,见下文--brain-client-features=3
--brain-hoststr大脑服务器主机(ip或域)--brain-host=127.0.0.1
--brain-portportbrain服务器端口--brain-port=13743
--brain-passwordstrbrain server身份验证密码--brain-password=123
--brain-sessionhex覆盖自动计算的大脑会话--brain-session=0x2ae611db
--brain-session-whitelisthex仅允许给定的会话,用逗号分隔--brain-session-whitelist=0x2ae611db

3.1. hashcat 的攻击模式(-a 参数)

使用的格式为:-a 后跟对应的数字编号

0 | straight(字段破解)
1 | combination(将字典中密码进行组合,例:1,2 -> 11 22 12 21)
3 | brute-force(掩码暴力破解)
6 | hybrid wordlist + mask(字典+掩码破解)
7 | hybrid mask + wordlist(掩码+字典破解)
9 | association(关联破解)

3.2. 输出格式(--outfile-format 参数)

1 | hash[:salt]
2 | plain
3 | hex_plain
4 | crack_pos
5 | timestamp absolute
6 | timestamp relative

3.3. 内置掩码字符集

l | abcdefghijklmnopqrstuvwxyz [a-z]
u | abcdefghijklmnopqrstuvwxyz [a-z]
d | 0123456789                 [0-9]
h | 0123456789abcdef           [0-9a-f]
h | 0123456789abcdef           [0-9a-f]
s |  !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~
a | ?l?u?d?s
b | 0x00 - 0xff

字符集含义:

  1. ?l:代表小写字母
  2. ?u:代表大写字母
  3. ?d:代表数字
  4. ?s:代表特殊字符
  5. ?a:代表大小写字母、数字以及特殊字符
  6. ?b:0x00-0xff

掩码的使用格式:

  1. 八位数字密码:?d?d?d?d?d?d?d?d
  2. 八位未知密码:?a?a?a?a?a?a?a?a
  3. 前四位为大写字母,后面四位为数字:?u?u?u?u?d?d?d?d
  4. 前四位为数字或者是小写字母,后四位为大写字母或者数字:?h?h?h?h?h?h?h?h
  5. 前三个字符未知,中间为admin,后三位未知:?a?a?aadmin?a?a?a
  6. 6-8 位数字密码:--increment --increment-min 6 --increment-max 8
  7. 6-8 位数字+小写字母密码:--increment --increment-min 6 --increment-max 8 ?h?h?h?h?h?h?h?h

3.4. hash 类型对照表(-m 参数)

可以通过 hashcat --help 查看。

      # | name                                                       | category
  ======+============================================================+======================================
    900 | md4                                                        | raw hash
      0 | md5                                                        | raw hash
    100 | sha1                                                       | raw hash
   1300 | sha2-224                                                   | raw hash
   1400 | sha2-256                                                   | raw hash
  10800 | sha2-384                                                   | raw hash
   1700 | sha2-512                                                   | raw hash
  17300 | sha3-224                                                   | raw hash
  17400 | sha3-256                                                   | raw hash
  17500 | sha3-384                                                   | raw hash
  17600 | sha3-512                                                   | raw hash
   6000 | ripemd-160                                                 | raw hash
    600 | blake2b-512                                                | raw hash
  11700 | gost r 34.11-2012 (streebog) 256-bit, big-endian           | raw hash
  11800 | gost r 34.11-2012 (streebog) 512-bit, big-endian           | raw hash
   6900 | gost r 34.11-94                                            | raw hash
  17010 | gpg (aes-128/aes-256 (sha-1($pass)))                       | raw hash
   5100 | half md5                                                   | raw hash
  17700 | keccak-224                                                 | raw hash
  17800 | keccak-256                                                 | raw hash
  17900 | keccak-384                                                 | raw hash
  18000 | keccak-512                                                 | raw hash
   6100 | whirlpool                                                  | raw hash
  10100 | siphash                                                    | raw hash
     70 | md5(utf16le($pass))                                        | raw hash
    170 | sha1(utf16le($pass))                                       | raw hash
   1470 | sha256(utf16le($pass))                                     | raw hash
  10870 | sha384(utf16le($pass))                                     | raw hash
   1770 | sha512(utf16le($pass))                                     | raw hash
    610 | blake2b-512($pass.$salt)                                   | raw hash salted and/or iterated
    620 | blake2b-512($salt.$pass)                                   | raw hash salted and/or iterated
     10 | md5($pass.$salt)                                           | raw hash salted and/or iterated
     20 | md5($salt.$pass)                                           | raw hash salted and/or iterated
   3800 | md5($salt.$pass.$salt)                                     | raw hash salted and/or iterated
   3710 | md5($salt.md5($pass))                                      | raw hash salted and/or iterated
   4110 | md5($salt.md5($pass.$salt))                                | raw hash salted and/or iterated
   4010 | md5($salt.md5($salt.$pass))                                | raw hash salted and/or iterated
  21300 | md5($salt.sha1($salt.$pass))                               | raw hash salted and/or iterated
     40 | md5($salt.utf16le($pass))                                  | raw hash salted and/or iterated
   2600 | md5(md5($pass))                                            | raw hash salted and/or iterated
   3910 | md5(md5($pass).md5($salt))                                 | raw hash salted and/or iterated
   3500 | md5(md5(md5($pass)))                                       | raw hash salted and/or iterated
   4400 | md5(sha1($pass))                                           | raw hash salted and/or iterated
   4410 | md5(sha1($pass).$salt)                                     | raw hash salted and/or iterated
  20900 | md5(sha1($pass).md5($pass).sha1($pass))                    | raw hash salted and/or iterated
  21200 | md5(sha1($salt).md5($pass))                                | raw hash salted and/or iterated
   4300 | md5(strtoupper(md5($pass)))                                | raw hash salted and/or iterated
     30 | md5(utf16le($pass).$salt)                                  | raw hash salted and/or iterated
    110 | sha1($pass.$salt)                                          | raw hash salted and/or iterated
    120 | sha1($salt.$pass)                                          | raw hash salted and/or iterated
   4900 | sha1($salt.$pass.$salt)                                    | raw hash salted and/or iterated
   4520 | sha1($salt.sha1($pass))                                    | raw hash salted and/or iterated
  24300 | sha1($salt.sha1($pass.$salt))                              | raw hash salted and/or iterated
    140 | sha1($salt.utf16le($pass))                                 | raw hash salted and/or iterated
  19300 | sha1($salt1.$pass.$salt2)                                  | raw hash salted and/or iterated
  14400 | sha1(cx)                                                   | raw hash salted and/or iterated
   4700 | sha1(md5($pass))                                           | raw hash salted and/or iterated
   4710 | sha1(md5($pass).$salt)                                     | raw hash salted and/or iterated
  21100 | sha1(md5($pass.$salt))                                     | raw hash salted and/or iterated
  18500 | sha1(md5(md5($pass)))                                      | raw hash salted and/or iterated
   4500 | sha1(sha1($pass))                                          | raw hash salted and/or iterated
   4510 | sha1(sha1($pass).$salt)                                    | raw hash salted and/or iterated
   5000 | sha1(sha1($salt.$pass.$salt))                              | raw hash salted and/or iterated
    130 | sha1(utf16le($pass).$salt)                                 | raw hash salted and/or iterated
   1410 | sha256($pass.$salt)                                        | raw hash salted and/or iterated
   1420 | sha256($salt.$pass)                                        | raw hash salted and/or iterated
  22300 | sha256($salt.$pass.$salt)                                  | raw hash salted and/or iterated
  20720 | sha256($salt.sha256($pass))                                | raw hash salted and/or iterated
  21420 | sha256($salt.sha256_bin($pass))                            | raw hash salted and/or iterated
   1440 | sha256($salt.utf16le($pass))                               | raw hash salted and/or iterated
  20800 | sha256(md5($pass))                                         | raw hash salted and/or iterated
  20710 | sha256(sha256($pass).$salt)                                | raw hash salted and/or iterated
  21400 | sha256(sha256_bin($pass))                                  | raw hash salted and/or iterated
   1430 | sha256(utf16le($pass).$salt)                               | raw hash salted and/or iterated
  10810 | sha384($pass.$salt)                                        | raw hash salted and/or iterated
  10820 | sha384($salt.$pass)                                        | raw hash salted and/or iterated
  10840 | sha384($salt.utf16le($pass))                               | raw hash salted and/or iterated
  10830 | sha384(utf16le($pass).$salt)                               | raw hash salted and/or iterated
   1710 | sha512($pass.$salt)                                        | raw hash salted and/or iterated
   1720 | sha512($salt.$pass)                                        | raw hash salted and/or iterated
   1740 | sha512($salt.utf16le($pass))                               | raw hash salted and/or iterated
   1730 | sha512(utf16le($pass).$salt)                               | raw hash salted and/or iterated
     50 | hmac-md5 (key = $pass)                                     | raw hash authenticated
     60 | hmac-md5 (key = $salt)                                     | raw hash authenticated
    150 | hmac-sha1 (key = $pass)                                    | raw hash authenticated
    160 | hmac-sha1 (key = $salt)                                    | raw hash authenticated
   1450 | hmac-sha256 (key = $pass)                                  | raw hash authenticated
   1460 | hmac-sha256 (key = $salt)                                  | raw hash authenticated
   1750 | hmac-sha512 (key = $pass)                                  | raw hash authenticated
   1760 | hmac-sha512 (key = $salt)                                  | raw hash authenticated
  11750 | hmac-streebog-256 (key = $pass), big-endian                | raw hash authenticated
  11760 | hmac-streebog-256 (key = $salt), big-endian                | raw hash authenticated
  11850 | hmac-streebog-512 (key = $pass), big-endian                | raw hash authenticated
  11860 | hmac-streebog-512 (key = $salt), big-endian                | raw hash authenticated
  28700 | amazon aws4-hmac-sha256                                    | raw hash authenticated
  11500 | crc32                                                      | raw checksum
  27900 | crc32c                                                     | raw checksum
  28000 | crc64jones                                                 | raw checksum
  18700 | java object hashcode()                                     | raw checksum
  25700 | murmurhash                                                 | raw checksum
  27800 | murmurhash3                                                | raw checksum
  14100 | 3des (pt = $salt, key = $pass)                             | raw cipher, known-plaintext attack
  14000 | des (pt = $salt, key = $pass)                              | raw cipher, known-plaintext attack
  26401 | aes-128-ecb nokdf (pt = $salt, key = $pass)                | raw cipher, known-plaintext attack
  26402 | aes-192-ecb nokdf (pt = $salt, key = $pass)                | raw cipher, known-plaintext attack
  26403 | aes-256-ecb nokdf (pt = $salt, key = $pass)                | raw cipher, known-plaintext attack
  15400 | chacha20                                                   | raw cipher, known-plaintext attack
  14500 | linux kernel crypto api (2.4)                              | raw cipher, known-plaintext attack
  14900 | skip32 (pt = $salt, key = $pass)                           | raw cipher, known-plaintext attack
  11900 | pbkdf2-hmac-md5                                            | generic kdf
  12000 | pbkdf2-hmac-sha1                                           | generic kdf
  10900 | pbkdf2-hmac-sha256                                         | generic kdf
  12100 | pbkdf2-hmac-sha512                                         | generic kdf
   8900 | scrypt                                                     | generic kdf
    400 | phpass                                                     | generic kdf
  16100 | tacacs+                                                    | network protocol
  11400 | sip digest authentication (md5)                            | network protocol
   5300 | ike-psk md5                                                | network protocol
   5400 | ike-psk sha1                                               | network protocol
  25100 | snmpv3 hmac-md5-96                                         | network protocol
  25000 | snmpv3 hmac-md5-96/hmac-sha1-96                            | network protocol
  25200 | snmpv3 hmac-sha1-96                                        | network protocol
  26700 | snmpv3 hmac-sha224-128                                     | network protocol
  26800 | snmpv3 hmac-sha256-192                                     | network protocol
  26900 | snmpv3 hmac-sha384-256                                     | network protocol
  27300 | snmpv3 hmac-sha512-384                                     | network protocol
   2500 | wpa-eapol-pbkdf2                                           | network protocol
   2501 | wpa-eapol-pmk                                              | network protocol
  22000 | wpa-pbkdf2-pmkid+eapol                                     | network protocol
  22001 | wpa-pmk-pmkid+eapol                                        | network protocol
  16800 | wpa-pmkid-pbkdf2                                           | network protocol
  16801 | wpa-pmkid-pmk                                              | network protocol
   7300 | ipmi2 rakp hmac-sha1                                       | network protocol
  10200 | cram-md5                                                   | network protocol
  16500 | jwt (json web token)                                       | network protocol
  29200 | radmin3                                                    | network protocol
  19600 | kerberos 5, etype 17, tgs-rep                              | network protocol
  19800 | kerberos 5, etype 17, pre-auth                             | network protocol
  28800 | kerberos 5, etype 17, db                                   | network protocol
  19700 | kerberos 5, etype 18, tgs-rep                              | network protocol
  19900 | kerberos 5, etype 18, pre-auth                             | network protocol
  28900 | kerberos 5, etype 18, db                                   | network protocol
   7500 | kerberos 5, etype 23, as-req pre-auth                      | network protocol
  13100 | kerberos 5, etype 23, tgs-rep                              | network protocol
  18200 | kerberos 5, etype 23, as-rep                               | network protocol
   5500 | netntlmv1 / netntlmv1+ess                                  | network protocol
  27000 | netntlmv1 / netntlmv1+ess (nt)                             | network protocol
   5600 | netntlmv2                                                  | network protocol
  27100 | netntlmv2 (nt)                                             | network protocol
  29100 | flask session cookie ($salt.$salt.$pass)                   | network protocol
   4800 | iscsi chap authentication, md5(chap)                       | network protocol
   8500 | racf                                                       | operating system
   6300 | aix {smd5}                                                 | operating system
   6700 | aix {ssha1}                                                | operating system
   6400 | aix {ssha256}                                              | operating system
   6500 | aix {ssha512}                                              | operating system
   3000 | lm                                                         | operating system
  19000 | qnx /etc/shadow (md5)                                      | operating system
  19100 | qnx /etc/shadow (sha256)                                   | operating system
  19200 | qnx /etc/shadow (sha512)                                   | operating system
  15300 | dpapi masterkey file v1 (context 1 and 2)                  | operating system
  15310 | dpapi masterkey file v1 (context 3)                        | operating system
  15900 | dpapi masterkey file v2 (context 1 and 2)                  | operating system
  15910 | dpapi masterkey file v2 (context 3)                        | operating system
   7200 | grub 2                                                     | operating system
  12800 | ms-azuresync pbkdf2-hmac-sha256                            | operating system
  12400 | bsdi crypt, extended des                                   | operating system
   1000 | ntlm                                                       | operating system
   9900 | radmin2                                                    | operating system
   5800 | samsung android password/pin                               | operating system
  28100 | windows hello pin/password                                 | operating system
  13800 | windows phone 8+ pin/password                              | operating system
   2410 | cisco-asa md5                                              | operating system
   9200 | cisco-ios $8$ (pbkdf2-sha256)                              | operating system
   9300 | cisco-ios $9$ (scrypt)                                     | operating system
   5700 | cisco-ios type 4 (sha256)                                  | operating system
   2400 | cisco-pix md5                                              | operating system
   8100 | citrix netscaler (sha1)                                    | operating system
  22200 | citrix netscaler (sha512)                                  | operating system
   1100 | domain cached credentials (dcc), ms cache                  | operating system
   2100 | domain cached credentials 2 (dcc2), ms cache 2             | operating system
   7000 | fortigate (fortios)                                        | operating system
  26300 | fortigate256 (fortios256)                                  | operating system
    125 | arubaos                                                    | operating system
    501 | juniper ive                                                | operating system
     22 | juniper netscreen/ssg (screenos)                           | operating system
  15100 | juniper/netbsd sha1crypt                                   | operating system
  26500 | iphone passcode (uid key + system keybag)                  | operating system
    122 | macos v10.4, macos v10.5, macos v10.6                      | operating system
   1722 | macos v10.7                                                | operating system
   7100 | macos v10.8+ (pbkdf2-sha512)                               | operating system
   3200 | bcrypt $2*$, blowfish (unix)                               | operating system
    500 | md5crypt, md5 (unix), cisco-ios $1$ (md5)                  | operating system
   1500 | descrypt, des (unix), traditional des                      | operating system
  29000 | sha1($salt.sha1(utf16le($username).':'.utf16le($pass)))    | operating system
   7400 | sha256crypt $5$, sha256 (unix)                             | operating system
   1800 | sha512crypt $6$, sha512 (unix)                             | operating system
  24600 | sqlcipher                                                  | database server
    131 | mssql (2000)                                               | database server
    132 | mssql (2005)                                               | database server
   1731 | mssql (2012, 2014)                                         | database server
  24100 | mongodb serverkey scram-sha-1                              | database server
  24200 | mongodb serverkey scram-sha-256                            | database server
     12 | postgresql                                                 | database server
  11100 | postgresql cram (md5)                                      | database server
  28600 | postgresql scram-sha-256                                   | database server
   3100 | oracle h: type (oracle 7+)                                 | database server
    112 | oracle s: type (oracle 11+)                                | database server
  12300 | oracle t: type (oracle 12+)                                | database server
   7401 | mysql $a$ (sha256crypt)                                    | database server
  11200 | mysql cram (sha1)                                          | database server
    200 | mysql323                                                   | database server
    300 | mysql4.1/mysql5                                            | database server
   8000 | sybase ase                                                 | database server
   8300 | dnssec (nsec3)                                             | ftp, http, smtp, ldap server
  25900 | knx ip secure - device authentication code                 | ftp, http, smtp, ldap server
  16400 | cram-md5 dovecot                                           | ftp, http, smtp, ldap server
   1411 | ssha-256(base64), ldap {ssha256}                           | ftp, http, smtp, ldap server
   1711 | ssha-512(base64), ldap {ssha512}                           | ftp, http, smtp, ldap server
  24900 | dahua authentication md5                                   | ftp, http, smtp, ldap server
  10901 | redhat 389-ds ldap (pbkdf2-hmac-sha256)                    | ftp, http, smtp, ldap server
  15000 | filezilla server >= 0.9.55                                 | ftp, http, smtp, ldap server
  12600 | coldfusion 10+                                             | ftp, http, smtp, ldap server
   1600 | apache $apr1$ md5, md5apr1, md5 (apr)                      | ftp, http, smtp, ldap server
    141 | episerver 6.x < .net 4                                     | ftp, http, smtp, ldap server
   1441 | episerver 6.x >= .net 4                                    | ftp, http, smtp, ldap server
   1421 | hmailserver                                                | ftp, http, smtp, ldap server
    101 | nsldap, sha-1(base64), netscape ldap sha                   | ftp, http, smtp, ldap server
    111 | nsldaps, ssha-1(base64), netscape ldap ssha                | ftp, http, smtp, ldap server
   7700 | sap codvn b (bcode)                                        | enterprise application software (eas)
   7701 | sap codvn b (bcode) from rfc_read_table                    | enterprise application software (eas)
   7800 | sap codvn f/g (passcode)                                   | enterprise application software (eas)
   7801 | sap codvn f/g (passcode) from rfc_read_table               | enterprise application software (eas)
  10300 | sap codvn h (pwdsaltedhash) issha-1                        | enterprise application software (eas)
    133 | peoplesoft                                                 | enterprise application software (eas)
  13500 | peoplesoft ps_token                                        | enterprise application software (eas)
  21500 | solarwinds orion                                           | enterprise application software (eas)
  21501 | solarwinds orion v2                                        | enterprise application software (eas)
     24 | solarwinds serv-u                                          | enterprise application software (eas)
   8600 | lotus notes/domino 5                                       | enterprise application software (eas)
   8700 | lotus notes/domino 6                                       | enterprise application software (eas)
   9100 | lotus notes/domino 8                                       | enterprise application software (eas)
  26200 | openedge progress encode                                   | enterprise application software (eas)
  20600 | oracle transportation management (sha256)                  | enterprise application software (eas)
   4711 | huawei sha1(md5($pass).$salt)                              | enterprise application software (eas)
  20711 | authme sha256                                              | enterprise application software (eas)
  22400 | aes crypt (sha256)                                         | full-disk encryption (fde)
  27400 | vmware vmx (pbkdf2-hmac-sha1 + aes-256-cbc)                | full-disk encryption (fde)
  14600 | luks v1 (legacy)                                           | full-disk encryption (fde)
  29541 | luks v1 ripemd-160 + aes                                   | full-disk encryption (fde)
  29542 | luks v1 ripemd-160 + serpent                               | full-disk encryption (fde)
  29543 | luks v1 ripemd-160 + twofish                               | full-disk encryption (fde)
  29511 | luks v1 sha-1 + aes                                        | full-disk encryption (fde)
  29512 | luks v1 sha-1 + serpent                                    | full-disk encryption (fde)
  29513 | luks v1 sha-1 + twofish                                    | full-disk encryption (fde)
  29521 | luks v1 sha-256 + aes                                      | full-disk encryption (fde)
  29522 | luks v1 sha-256 + serpent                                  | full-disk encryption (fde)
  29523 | luks v1 sha-256 + twofish                                  | full-disk encryption (fde)
  29531 | luks v1 sha-512 + aes                                      | full-disk encryption (fde)
  29532 | luks v1 sha-512 + serpent                                  | full-disk encryption (fde)
  29533 | luks v1 sha-512 + twofish                                  | full-disk encryption (fde)
  13711 | veracrypt ripemd160 + xts 512 bit (legacy)                 | full-disk encryption (fde)
  13712 | veracrypt ripemd160 + xts 1024 bit (legacy)                | full-disk encryption (fde)
  13713 | veracrypt ripemd160 + xts 1536 bit (legacy)                | full-disk encryption (fde)
  13741 | veracrypt ripemd160 + xts 512 bit + boot-mode (legacy)     | full-disk encryption (fde)
  13742 | veracrypt ripemd160 + xts 1024 bit + boot-mode (legacy)    | full-disk encryption (fde)
  13743 | veracrypt ripemd160 + xts 1536 bit + boot-mode (legacy)    | full-disk encryption (fde)
  29411 | veracrypt ripemd160 + xts 512 bit                          | full-disk encryption (fde)
  29412 | veracrypt ripemd160 + xts 1024 bit                         | full-disk encryption (fde)
  29413 | veracrypt ripemd160 + xts 1536 bit                         | full-disk encryption (fde)
  29441 | veracrypt ripemd160 + xts 512 bit + boot-mode              | full-disk encryption (fde)
  29442 | veracrypt ripemd160 + xts 1024 bit + boot-mode             | full-disk encryption (fde)
  29443 | veracrypt ripemd160 + xts 1536 bit + boot-mode             | full-disk encryption (fde)
  13751 | veracrypt sha256 + xts 512 bit (legacy)                    | full-disk encryption (fde)
  13752 | veracrypt sha256 + xts 1024 bit (legacy)                   | full-disk encryption (fde)
  13753 | veracrypt sha256 + xts 1536 bit (legacy)                   | full-disk encryption (fde)
  13761 | veracrypt sha256 + xts 512 bit + boot-mode (legacy)        | full-disk encryption (fde)
  13762 | veracrypt sha256 + xts 1024 bit + boot-mode (legacy)       | full-disk encryption (fde)
  13763 | veracrypt sha256 + xts 1536 bit + boot-mode (legacy)       | full-disk encryption (fde)
  29451 | veracrypt sha256 + xts 512 bit                             | full-disk encryption (fde)
  29452 | veracrypt sha256 + xts 1024 bit                            | full-disk encryption (fde)
  29453 | veracrypt sha256 + xts 1536 bit                            | full-disk encryption (fde)
  29461 | veracrypt sha256 + xts 512 bit + boot-mode                 | full-disk encryption (fde)
  29462 | veracrypt sha256 + xts 1024 bit + boot-mode                | full-disk encryption (fde)
  29463 | veracrypt sha256 + xts 1536 bit + boot-mode                | full-disk encryption (fde)
  13721 | veracrypt sha512 + xts 512 bit (legacy)                    | full-disk encryption (fde)
  13722 | veracrypt sha512 + xts 1024 bit (legacy)                   | full-disk encryption (fde)
  13723 | veracrypt sha512 + xts 1536 bit (legacy)                   | full-disk encryption (fde)
  29421 | veracrypt sha512 + xts 512 bit                             | full-disk encryption (fde)
  29422 | veracrypt sha512 + xts 1024 bit                            | full-disk encryption (fde)
  29423 | veracrypt sha512 + xts 1536 bit                            | full-disk encryption (fde)
  13771 | veracrypt streebog-512 + xts 512 bit (legacy)              | full-disk encryption (fde)
  13772 | veracrypt streebog-512 + xts 1024 bit (legacy)             | full-disk encryption (fde)
  13773 | veracrypt streebog-512 + xts 1536 bit (legacy)             | full-disk encryption (fde)
  13781 | veracrypt streebog-512 + xts 512 bit + boot-mode (legacy)  | full-disk encryption (fde)
  13782 | veracrypt streebog-512 + xts 1024 bit + boot-mode (legacy) | full-disk encryption (fde)
  13783 | veracrypt streebog-512 + xts 1536 bit + boot-mode (legacy) | full-disk encryption (fde)
  29471 | veracrypt streebog-512 + xts 512 bit                       | full-disk encryption (fde)
  29472 | veracrypt streebog-512 + xts 1024 bit                      | full-disk encryption (fde)
  29473 | veracrypt streebog-512 + xts 1536 bit                      | full-disk encryption (fde)
  29481 | veracrypt streebog-512 + xts 512 bit + boot-mode           | full-disk encryption (fde)
  29482 | veracrypt streebog-512 + xts 1024 bit + boot-mode          | full-disk encryption (fde)
  29483 | veracrypt streebog-512 + xts 1536 bit + boot-mode          | full-disk encryption (fde)
  13731 | veracrypt whirlpool + xts 512 bit (legacy)                 | full-disk encryption (fde)
  13732 | veracrypt whirlpool + xts 1024 bit (legacy)                | full-disk encryption (fde)
  13733 | veracrypt whirlpool + xts 1536 bit (legacy)                | full-disk encryption (fde)
  29431 | veracrypt whirlpool + xts 512 bit                          | full-disk encryption (fde)
  29432 | veracrypt whirlpool + xts 1024 bit                         | full-disk encryption (fde)
  29433 | veracrypt whirlpool + xts 1536 bit                         | full-disk encryption (fde)
  23900 | bestcrypt v3 volume encryption                             | full-disk encryption (fde)
  16700 | filevault 2                                                | full-disk encryption (fde)
  27500 | virtualbox (pbkdf2-hmac-sha256 & aes-128-xts)              | full-disk encryption (fde)
  27600 | virtualbox (pbkdf2-hmac-sha256 & aes-256-xts)              | full-disk encryption (fde)
  20011 | diskcryptor sha512 + xts 512 bit                           | full-disk encryption (fde)
  20012 | diskcryptor sha512 + xts 1024 bit                          | full-disk encryption (fde)
  20013 | diskcryptor sha512 + xts 1536 bit                          | full-disk encryption (fde)
  22100 | bitlocker                                                  | full-disk encryption (fde)
  12900 | android fde (samsung dek)                                  | full-disk encryption (fde)
   8800 | android fde <= 4.3                                         | full-disk encryption (fde)
  18300 | apple file system (apfs)                                   | full-disk encryption (fde)
   6211 | truecrypt ripemd160 + xts 512 bit (legacy)                 | full-disk encryption (fde)
   6212 | truecrypt ripemd160 + xts 1024 bit (legacy)                | full-disk encryption (fde)
   6213 | truecrypt ripemd160 + xts 1536 bit (legacy)                | full-disk encryption (fde)
   6241 | truecrypt ripemd160 + xts 512 bit + boot-mode (legacy)     | full-disk encryption (fde)
   6242 | truecrypt ripemd160 + xts 1024 bit + boot-mode (legacy)    | full-disk encryption (fde)
   6243 | truecrypt ripemd160 + xts 1536 bit + boot-mode (legacy)    | full-disk encryption (fde)
  29311 | truecrypt ripemd160 + xts 512 bit                          | full-disk encryption (fde)
  29312 | truecrypt ripemd160 + xts 1024 bit                         | full-disk encryption (fde)
  29313 | truecrypt ripemd160 + xts 1536 bit                         | full-disk encryption (fde)
  29341 | truecrypt ripemd160 + xts 512 bit + boot-mode              | full-disk encryption (fde)
  29342 | truecrypt ripemd160 + xts 1024 bit + boot-mode             | full-disk encryption (fde)
  29343 | truecrypt ripemd160 + xts 1536 bit + boot-mode             | full-disk encryption (fde)
   6221 | truecrypt sha512 + xts 512 bit (legacy)                    | full-disk encryption (fde)
   6222 | truecrypt sha512 + xts 1024 bit (legacy)                   | full-disk encryption (fde)
   6223 | truecrypt sha512 + xts 1536 bit (legacy)                   | full-disk encryption (fde)
  29321 | truecrypt sha512 + xts 512 bit                             | full-disk encryption (fde)
  29322 | truecrypt sha512 + xts 1024 bit                            | full-disk encryption (fde)
  29323 | truecrypt sha512 + xts 1536 bit                            | full-disk encryption (fde)
   6231 | truecrypt whirlpool + xts 512 bit (legacy)                 | full-disk encryption (fde)
   6232 | truecrypt whirlpool + xts 1024 bit (legacy)                | full-disk encryption (fde)
   6233 | truecrypt whirlpool + xts 1536 bit (legacy)                | full-disk encryption (fde)
  29331 | truecrypt whirlpool + xts 512 bit                          | full-disk encryption (fde)
  29332 | truecrypt whirlpool + xts 1024 bit                         | full-disk encryption (fde)
  29333 | truecrypt whirlpool + xts 1536 bit                         | full-disk encryption (fde)
  12200 | ecryptfs                                                   | full-disk encryption (fde)
  10400 | pdf 1.1 - 1.3 (acrobat 2 - 4)                              | document
  10410 | pdf 1.1 - 1.3 (acrobat 2 - 4), collider #1                 | document
  10420 | pdf 1.1 - 1.3 (acrobat 2 - 4), collider #2                 | document
  10500 | pdf 1.4 - 1.6 (acrobat 5 - 8)                              | document
  25400 | pdf 1.4 - 1.6 (acrobat 5 - 8) - user and owner pass        | document
  10600 | pdf 1.7 level 3 (acrobat 9)                                | document
  10700 | pdf 1.7 level 8 (acrobat 10 - 11)                          | document
   9400 | ms office 2007                                             | document
   9500 | ms office 2010                                             | document
   9600 | ms office 2013                                             | document
  25300 | ms office 2016 - sheetprotection                           | document
   9700 | ms office <= 2003 $0/$1, md5 + rc4                         | document
   9710 | ms office <= 2003 $0/$1, md5 + rc4, collider #1            | document
   9720 | ms office <= 2003 $0/$1, md5 + rc4, collider #2            | document
   9810 | ms office <= 2003 $3, sha1 + rc4, collider #1              | document
   9820 | ms office <= 2003 $3, sha1 + rc4, collider #2              | document
   9800 | ms office <= 2003 $3/$4, sha1 + rc4                        | document
  18400 | open document format (odf) 1.2 (sha-256, aes)              | document
  18600 | open document format (odf) 1.1 (sha-1, blowfish)           | document
  16200 | apple secure notes                                         | document
  23300 | apple iwork                                                | document
   6600 | 1password, agilekeychain                                   | password manager
   8200 | 1password, cloudkeychain                                   | password manager
   9000 | password safe v2                                           | password manager
   5200 | password safe v3                                           | password manager
   6800 | lastpass + lastpass sniffed                                | password manager
  13400 | keepass 1 (aes/twofish) and keepass 2 (aes)                | password manager
  29700 | keepass 1 (aes/twofish) and keepass 2 (aes) - keyfile only mode | password manager
  23400 | bitwarden                                                  | password manager
  16900 | ansible vault                                              | password manager
  26000 | mozilla key3.db                                            | password manager
  26100 | mozilla key4.db                                            | password manager
  23100 | apple keychain                                             | password manager
  11600 | 7-zip                                                      | archive
  12500 | rar3-hp                                                    | archive
  23800 | rar3-p (compressed)                                        | archive
  23700 | rar3-p (uncompressed)                                      | archive
  13000 | rar5                                                       | archive
  17220 | pkzip (compressed multi-file)                              | archive
  17200 | pkzip (compressed)                                         | archive
  17225 | pkzip (mixed multi-file)                                   | archive
  17230 | pkzip (mixed multi-file checksum-only)                     | archive
  17210 | pkzip (uncompressed)                                       | archive
  20500 | pkzip master key                                           | archive
  20510 | pkzip master key (6 byte optimization)                     | archive
  23001 | securezip aes-128                                          | archive
  23002 | securezip aes-192                                          | archive
  23003 | securezip aes-256                                          | archive
  13600 | winzip                                                     | archive
  18900 | android backup                                             | archive
  24700 | stuffit5                                                   | archive
  13200 | axcrypt 1                                                  | archive
  13300 | axcrypt 1 in-memory sha1                                   | archive
  23500 | axcrypt 2 aes-128                                          | archive
  23600 | axcrypt 2 aes-256                                          | archive
  14700 | itunes backup < 10.0                                       | archive
  14800 | itunes backup >= 10.0                                      | archive
   8400 | wbb3 (woltlab burning board)                               | forums, cms, e-commerce
   2612 | phps                                                       | forums, cms, e-commerce
    121 | smf (simple machines forum) > v1.1                         | forums, cms, e-commerce
   3711 | mediawiki b type                                           | forums, cms, e-commerce
   4521 | redmine                                                    | forums, cms, e-commerce
  24800 | umbraco hmac-sha1                                          | forums, cms, e-commerce
     11 | joomla < 2.5.18                                            | forums, cms, e-commerce
  13900 | opencart                                                   | forums, cms, e-commerce
  11000 | prestashop                                                 | forums, cms, e-commerce
  16000 | tripcode                                                   | forums, cms, e-commerce
   7900 | drupal7                                                    | forums, cms, e-commerce
   4522 | punbb                                                      | forums, cms, e-commerce
   2811 | mybb 1.2+, ipb2+ (invision power board)                    | forums, cms, e-commerce
   2611 | vbulletin < v3.8.5                                         | forums, cms, e-commerce
   2711 | vbulletin >= v3.8.5                                        | forums, cms, e-commerce
  25600 | bcrypt(md5($pass)) / bcryptmd5                             | forums, cms, e-commerce
  25800 | bcrypt(sha1($pass)) / bcryptsha1                           | forums, cms, e-commerce
  28400 | bcrypt(sha512($pass)) / bcryptsha512                       | forums, cms, e-commerce
     21 | oscommerce, xt:commerce                                    | forums, cms, e-commerce
  18100 | totp (hmac-sha1)                                           | one-time password
   2000 | stdout                                                     | plaintext
  99999 | plaintext                                                  | plaintext
  21600 | web2py pbkdf2-sha512                                       | framework
  10000 | django (pbkdf2-sha256)                                     | framework
    124 | django (sha-1)                                             | framework
  12001 | atlassian (pbkdf2-hmac-sha1)                               | framework
  19500 | ruby on rails restful-authentication                       | framework
  27200 | ruby on rails restful auth (one round, no sitekey)         | framework
  30000 | python werkzeug md5 (hmac-md5 (key = $salt))               | framework
  30120 | python werkzeug sha256 (hmac-sha256 (key = $salt))         | framework
  20200 | python passlib pbkdf2-sha512                               | framework
  20300 | python passlib pbkdf2-sha256                               | framework
  20400 | python passlib pbkdf2-sha1                                 | framework
  24410 | pkcs#8 private keys (pbkdf2-hmac-sha1 + 3des/aes)          | private key
  24420 | pkcs#8 private keys (pbkdf2-hmac-sha256 + 3des/aes)        | private key
  15500 | jks java key store private keys (sha1)                     | private key
  22911 | rsa/dsa/ec/openssh private keys ($0$)                      | private key
  22921 | rsa/dsa/ec/openssh private keys ($6$)                      | private key
  22931 | rsa/dsa/ec/openssh private keys ($1, $3$)                  | private key
  22941 | rsa/dsa/ec/openssh private keys ($4$)                      | private key
  22951 | rsa/dsa/ec/openssh private keys ($5$)                      | private key
  23200 | xmpp scram pbkdf2-sha1                                     | instant messaging service
  28300 | teamspeak 3 (channel hash)                                 | instant messaging service
  22600 | telegram desktop < v2.1.14 (pbkdf2-hmac-sha1)              | instant messaging service
  24500 | telegram desktop >= v2.1.14 (pbkdf2-hmac-sha512)           | instant messaging service
  22301 | telegram mobile app passcode (sha256)                      | instant messaging service
     23 | skype                                                      | instant messaging service
  29600 | terra station wallet (aes256-cbc(pbkdf2($pass)))           | cryptocurrency wallet
  26600 | metamask wallet                                            | cryptocurrency wallet
  21000 | bitshares v0.x - sha512(sha512_bin(pass))                  | cryptocurrency wallet
  28501 | bitcoin wif private key (p2pkh), compressed                | cryptocurrency wallet
  28502 | bitcoin wif private key (p2pkh), uncompressed              | cryptocurrency wallet
  28503 | bitcoin wif private key (p2wpkh, bech32), compressed       | cryptocurrency wallet
  28504 | bitcoin wif private key (p2wpkh, bech32), uncompressed     | cryptocurrency wallet
  28505 | bitcoin wif private key (p2sh(p2wpkh)), compressed         | cryptocurrency wallet
  28506 | bitcoin wif private key (p2sh(p2wpkh)), uncompressed       | cryptocurrency wallet
  11300 | bitcoin/litecoin wallet.dat                                | cryptocurrency wallet
  16600 | electrum wallet (salt-type 1-3)                            | cryptocurrency wallet
  21700 | electrum wallet (salt-type 4)                              | cryptocurrency wallet
  21800 | electrum wallet (salt-type 5)                              | cryptocurrency wallet
  12700 | blockchain, my wallet                                      | cryptocurrency wallet
  15200 | blockchain, my wallet, v2                                  | cryptocurrency wallet
  18800 | blockchain, my wallet, second password (sha256)            | cryptocurrency wallet
  25500 | stargazer stellar wallet xlm                               | cryptocurrency wallet
  16300 | ethereum pre-sale wallet, pbkdf2-hmac-sha256               | cryptocurrency wallet
  15600 | ethereum wallet, pbkdf2-hmac-sha256                        | cryptocurrency wallet
  15700 | ethereum wallet, scrypt                                    | cryptocurrency wallet
  22500 | multibit classic .key (md5)                                | cryptocurrency wallet
  27700 | multibit classic .wallet (scrypt)                          | cryptocurrency wallet
  22700 | multibit hd (scrypt)                                       | cryptocurrency wallet
  28200 | exodus desktop wallet (scrypt)                             | cryptocurrency wallet

3.5. 工作负载配置

 # | performance | runtime | power consumption | desktop impact
===+=============+=========+===================+=================
 1 | low         |   2 ms  | low               | minimal
 2 | default     |  12 ms  | economic          | noticeable
 3 | high        |  96 ms  | high              | unresponsive
 4 | nightmare   | 480 ms  | insane            | headless

四. hashcat 的常见使用案例

hashcat 支持多种平台、多种 hash 密文的破解。

4.1. rar 文件解密

1. 通过 john the ripper 获取文件的密文值

把要获取密文的 rar 文件拷贝到 john-1.9.0-jumbo-1-win64 的 run 目录下。

// 通过命令获取密文值
rar2john.exe python_glxtym.rar

// 获取到的密文为:
$rar3$*1*a55d3f6aa676f7b3*9b850ef5*16*8*1*5d3dbaafa35e973c49a01dfcdcebfc4e*33

2. 通过 hashcat 获取明文密码

hashcat.exe -m 23800 -a 3 $rar3$*1*a55d3f6aa676f7b3*9b850ef5*16*8*1*5d3dbaafa35e973c49a01dfcdcebfc4e*33 -o password.txt

破解成功会在目录下生成 password.txt 文件。 

4.2. md5 密文解密

4.2.1. 字典模式破解

需要提前准备好字典文件 password.dict。

hashcat  -m 0 -a 0 d3786ec2413a8cd9413bfcb24be95a73   password.dict  --force
hashcat  -m 0 -a 0 d3786ec2413a8cd9413bfcb24be95a73   password.dict  --force --show
hashcat  -m 0 -a 0 d3786ec2413a8cd9413bfcb24be95a73   password.dict  -o result.txt –force

4.2.2. 掩码模式破解

hashcat -m 0 -a 3 63a9f0ea7bb98050796b649e85481845 ?l?l?l?l --force -o -w 3 -s
hashcat -m 0 -a 3 63a9f0ea7bb98050796b649e85481845 ?l?l?l?l --force -o -w 3 -s --show
hashcat -m 0 -a 3 63a9f0ea7bb98050796b649e85481845 ?l?l?l?l -o result.txt  --force --show -o -w 3 -s

4.2.3. 使用字典+掩码进行破解

hashcat -m 0 -a 6 1844156d4166d94387f1a4ad031ca5fa password.dict ?d?d --force -o
hashcat -m 0 -a 6 1844156d4166d94387f1a4ad031ca5fa password.dict ?d?d --force --show –o
hashcat -m 0 -a 6 1844156d4166d94387f1a4ad031ca5fa password.dict ?d?d -o result.txt --force –show –o

4.2.4. 使用掩码+字典进行破解

hashcat -m 0 -a 7 f8def8bcecb2e7925a2b42d60d202deb ?d?d password.dict --force -o
hashcat -m 0 -a 7 f8def8bcecb2e7925a2b42d60d202deb ?d?d password.dict --force -o --show
hashcat -m 0 -a 7 f8def8bcecb2e7925a2b42d60d202deb ?d?d password.dict -o result.txt --force –o
如果已经破解过,加参数:--show

4.2.5. 批量字典破解

hashcat -m 0 -a 0 jiami.txt password.dict --force
提前准备加密文件

破解后的结果文件如下:

4.3. sha512 密文解密

密文:$6$zje1waos$eh24jfr5n67149ybcdwwsfxme5cyloxmmjxnf2uinbvym8vwc0bmjvaoxify/0zujitrpphhkcgdiqjxt10ev0

首先使用hashidentifier工具识别该密文的类型:

  • 识别到的 hash 类型为 sha512 crypt
  • 对应 hashcat 的类型编号为 1800

再使用 hashcat 使用字典破解模式进行破解,提前准备字典文件:

hashcat -m 1800 -a 0 $6$zje1waos$eh24jfr5n67149ybcdwwsfxme5cyloxmmjxnf2uinbvym8vwc0bmjvaoxify/0zujitrpphhkcgdiqjxt10ev0 password.dict  --force

如果破解时间太长,我们可以按 s 键查看破解进度,p 键暂停,r 键继续破解,q 键退出破解。

4.4. windows 密码解密

windows 系统通常使用两种方法对用户的明文密码进行加密处理,分别是:

  • lm hash :对应 hashcat 中的类型编号为 3000
  • ntlm hash:对应 hashcat 中的类型编号为 1000

lm hash 是一种 windows 系统身份认证协议,在 windows 7 或 windows 2008 之前的系统使用,之后的系统默认禁用了 lm hash 协议认证,使用 ntlm hash 的方式。

对 windows 密码进行破解建议使用高版本的 hashcat 软件,4.1.0及以下的版本会因各种问题提前终止破解而导致破解失败,本案例建议使用最新的 hashcat-6.2.6 版本

1. root 字符串对应的 lm hash 密文为:d480ea9533c500d4aad3b435b51404ee

hashcat -m 3000 -a 0 d480ea9533c500d4aad3b435b51404ee password.dict --force

 

2. root 字符串对应的 ntlm hash 密文为:329153f560eb329c0e1deea55e88a1e9

hashcat -m 1000 -a 0 329153f560eb329c0e1deea55e88a1e9 password.dict --force -o -w 3 -s

4.5. mysql 密码解密

hashcat -a 3 -m 300 --force 6bb4837eb74329105ee4568dda7dc67ed2ca2ad9 ?d?d?d?d?d?d

4.6. office 密码解密

获取 office 的 hash 值:python office2john.py 11.docx

结果:
11.docx:$office$*2013*100000*256*16*e4a3eb62e8d3576f861f9eded75e0525*9eeb35f0849a7800d48113440b4bbb9c*577f8d8b2e1c5f60fed76e62327b38d28f25230f6c7dfd66588d9ca8097aabb9

破解密码:

hashcat -a 3 -m 9600 $office$*2013*100000*256*16*e4a3eb62e8d3576f861f9eded75e0525*9eeb35f0849a7800d48113440b4bbb9c*577f8d8b2e1c5f60fed76e62327b38d28f25230f6c7dfd66588d9ca8097aabb9 --force ?d?d?d?d?d?d

4.7. 在线解密

sha 256 在线解密:http://www.ttmd5.com/hash.php?type=09

md5 在线解密:https://www.somd5.com/

end

(0)

相关文章:

版权声明:本文内容由互联网用户贡献,该文观点仅代表作者本人。本站仅提供信息存储服务,不拥有所有权,不承担相关法律责任。 如发现本站有涉嫌抄袭侵权/违法违规的内容, 请发送邮件至 2386932994@qq.com 举报,一经查实将立刻删除。

发表评论

验证码:
Copyright © 2017-2025  代码网 保留所有权利. 粤ICP备2024248653号
站长QQ:2386932994 | 联系邮箱:2386932994@qq.com