Update cheatsheets

This commit is contained in:
ivuorinen
2026-02-27 00:28:17 +00:00
parent 626abade0f
commit a03e958c7f
5 changed files with 61 additions and 16 deletions

View File

@@ -10,27 +10,27 @@ source: https://github.com/tldr-pages/tldr.git
- Perform a brute-force attack (mode 3) with the default hashcat mask:
`hashcat --hash-type {{hash_type_id}} --attack-mode {{3}} {{hash_value}}`
`hashcat {{[-m|--hash-type]}} {{hash_type_id}} {{[-a|--attack-mode]}} 3 {{hash_value}}`
- Perform a brute-force attack (mode 3) with a known pattern of 4 digits:
`hashcat --hash-type {{hash_type_id}} --attack-mode {{3}} {{hash_value}} "{{?d?d?d?d}}"`
`hashcat {{[-m|--hash-type]}} {{hash_type_id}} {{[-a|--attack-mode]}} 3 {{hash_value}} "{{?d?d?d?d}}"`
- Perform a brute-force attack (mode 3) using at most 8 of all printable ASCII characters:
`hashcat --hash-type {{hash_type_id}} --attack-mode {{3}} --increment {{hash_value}} "{{?a?a?a?a?a?a?a?a}}"`
`hashcat {{[-m|--hash-type]}} {{hash_type_id}} {{[-a|--attack-mode]}} 3 --increment {{hash_value}} "{{?a?a?a?a?a?a?a?a}}"`
- Perform a dictionary attack (mode 0) using the RockYou wordlist of a Kali Linux box:
- Perform a dictionary attack (mode 0) using a wordlist:
`hashcat --hash-type {{hash_type_id}} --attack-mode {{0}} {{hash_value}} {{/usr/share/wordlists/rockyou.txt}}`
`hashcat {{[-m|--hash-type]}} {{hash_type_id}} {{[-a|--attack-mode]}} 0 {{hash_value}} {{path/to/wordlist.txt}}`
- Perform a rule-based dictionary attack (mode 0) using the RockYou wordlist mutated with common password variations:
- Run a dictionary attack (mode 0) using the specified wordlist, applying rule-based transformations to mutate candidate passwords:
`hashcat --hash-type {{hash_type_id}} --attack-mode {{0}} --rules-file {{/usr/share/hashcat/rules/best64.rule}} {{hash_value}} {{/usr/share/wordlists/rockyou.txt}}`
`hashcat {{[-m|--hash-type]}} {{hash_type_id}} {{[-a|--attack-mode]}} 0 {{[-r|--rules-file]}} {{path/to/file.rule}} {{hash_value}} {{path/to/wordlist.txt}}`
- Perform a combination attack (mode 1) using the concatenation of words from two different custom dictionaries:
`hashcat --hash-type {{hash_type_id}} --attack-mode {{1}} {{hash_value}} /{{path/to/dictionary1.txt}} /{{path/to/dictionary2.txt}}`
`hashcat {{[-m|--hash-type]}} {{hash_type_id}} {{[-a|--attack-mode]}} 1 {{hash_value}} {{path/to/dictionary1.txt}} {{path/to/dictionary2.txt}}`
- Show result of an already cracked hash: