Options (3)
-m, --hash-typebooleanPerform a brute-force attack (mode 3) with the default hashcat mask
hashcat {{[-m|--hash-type]}} {{hash_type_id}} {{[-a|--attack-mode]}} 3 {{hash_value}}-a, --attack-modebooleanPerform a brute-force attack (mode 3) with the default hashcat mask
hashcat {{[-m|--hash-type]}} {{hash_type_id}} {{[-a|--attack-mode]}} 3 {{hash_value}}-r, --rules-filebooleanRun a dictionary attack (mode 0) using the specified wordlist, applying rule-based transformations to mutate candidate passwords
hashcat {{[-m|--hash-type]}} {{hash_type_id}} {{[-a|--attack-mode]}} 0 {{[-r|--rules-file]}} {{path/to/file.rule}} {{hash_value}} {{path/to/wordlist.txt}}Examples (8)
Perform a brute-force attack (mode 3) with the default hashcat mask
hashcat [-m|--hash-type] hash_type_id [-a|--attack-mode] 3 hash_valuePerform a brute-force attack (mode 3) with a known pattern of 4 digits
hashcat [-m|--hash-type] hash_type_id [-a|--attack-mode] 3 hash_value "?d?d?d?d"Perform a brute-force attack (mode 3) using at most 8 of all printable ASCII characters
hashcat [-m|--hash-type] hash_type_id [-a|--attack-mode] 3 --increment hash_value "?a?a?a?a?a?a?a?a"Perform a dictionary attack (mode 0) using a wordlist
hashcat [-m|--hash-type] hash_type_id [-a|--attack-mode] 0 hash_value path/to/wordlist.txtRun a dictionary attack (mode 0) using the specified wordlist, applying rule-based transformations to mutate candidate passwords
hashcat [-m|--hash-type] hash_type_id [-a|--attack-mode] 0 [-r|--rules-file] path/to/file.rule hash_value path/to/wordlist.txtPerform a combination attack (mode 1) using the concatenation of words from two different custom dictionaries
hashcat [-m|--hash-type] hash_type_id [-a|--attack-mode] 1 hash_value path/to/dictionary1.txt path/to/dictionary2.txtShow result of an already cracked hash
hashcat --show hash_valueShow all example hashes
hashcat --example-hashes