用Hashcat每秒计算1.4亿个密码,破解隔壁WIFI密码
Hashcat是啥
Hashcat是什么呢?Hashcat是当前最强大的开源密码恢复工具,你可以访问Hashcat.net网站来了解这款工具的详细情况。本质上,Hashcat 3.0是一款高级密码恢复工具,可以利用CPU或GPU资源来攻击160多种哈希类型的密码
计算机环境准备
本地的测试系统为Mac
需要把airodump抓到的 4 次握手文件转换为hccap的格式
txt格式的字典文件
Hashcat和aircrack-ng的对比
使用aricrack-ng暴力破解8位数密码需要50个小时, 但是使用Hashcat只要1个半小时不到
使用aircrac-ng破解密码的时候计算机会爆卡, 内存占用100%是常事, 使用Hashcat破解的时候计算机一点都不卡, Hashcat不但支持CPU破解,还支持GPU破解,利用显卡的计算能力进行极速破解,简直666
即使使用普通的CPU或GPU,每秒也能够生成1.35亿个哈希值, 我这台电脑是Mac Air,破解8位数字需要随机组合68719476736个数字, 这个是千万级别的数字, 使用Hashcat破解只需要1小时40分钟, 平均一秒钟计算1.4个亿密码
Hashcat的安装
先把github上面的源码down到本地:
git clone https://github.com/hashcat/hashcat.git
然后生成项目:
cd hashcat //进入目录
sudo make
sudo make install //安装hashcat
如果安装成功, 在命令行输入hashcat,即可看到帮助文档:
hashcat, advanced password recovery Usage: hashcat [options]... hash|hashfile|hccapfile [dictionary|mask|directory]... - [ Options ] - Options Short / Long | Type | Description | Example
===============================+======+======================================================+=======================
-m, --hash-type | Num | Hash-type, see references below | -m
-a, --attack-mode | Num | Attack-mode, see references below | -a
-V, --version | | Print version |
-h, --help | | Print help |
--quiet | | Suppress output |
--hex-charset | | Assume charset is given in hex |
--hex-salt | | Assume salt is given in hex |
--hex-wordlist | | Assume words in wordlist is given in hex |
--force | | Ignore warnings |
--status | | Enable automatic update of the status-screen |
--status-timer | Num | Sets seconds between status-screen update to X | --status-timer=
--machine-readable | | Display the status view in a machine readable format |
--keep-guessing | | Keep guessing the hash after it has been cracked |
--loopback | | Add new plains to induct directory |
--weak-hash-threshold | Num | Threshold X when to stop checking for weak hashes | --weak=
--markov-hcstat | File | Specify hcstat file to use | --markov-hc=my.hcstat
--markov-disable | | Disables markov-chains, emulates classic brute-force |
--markov-classic | | Enables classic markov-chains, no per-position |
-t, --markov-threshold | Num | Threshold X when to stop accepting new markov-chains | -t
--runtime | Num | Abort session after X seconds of runtime | --runtime=
--session | Str | Define specific session name | --session=mysession
--restore | | Restore session from --session |
--restore-disable | | Do not write restore file |
--restore-file-path | File | Specific path to restore file | --restore-file-path=my.restore
-o, --outfile | File | Define outfile for recovered hash | -o outfile.txt
--outfile-format | Num | Define outfile-format X for recovered hash | --outfile-format=
--outfile-autohex-disable | | Disable the use of $HEX[] in output plains |
--outfile-check-timer | Num | Sets seconds between outfile checks to X | --outfile-check=
-p, --separator | Char | Separator char for hashlists and outfile | -p :
--stdout | | Do not crack a hash, instead print candidates only |
--show | | Compare hashlist with potfile; Show cracked hashes |
--left | | Compare hashlist with potfile; Show uncracked hashes |
--username | | Enable ignoring of usernames in hashfile |
--remove | | Enable remove of hash once it is cracked |
--remove-timer | Num | Update input hash file each X seconds | --remove-timer=
--potfile-disable | | Do not write potfile |
--potfile-path | Dir | Specific path to potfile | --potfile-path=my.pot
--debug-mode | Num | Defines the debug mode (hybrid only by using rules) | --debug-mode=
--debug-file | File | Output file for debugging rules | --debug-file=good.log
--induction-dir | Dir | Specify the induction directory to use for loopback | --induction=inducts
--outfile-check-dir | Dir | Specify the outfile directory to monitor for plains | --outfile-check-dir=x
--logfile-disable | | Disable the logfile |
--truecrypt-keyfiles | File | Keyfiles used, separate with comma | --truecrypt-key=x.png
--veracrypt-keyfiles | File | Keyfiles used, separate with comma | --veracrypt-key=x.txt
--veracrypt-pim | Num | VeraCrypt personal iterations multiplier | --veracrypt-pim=
-b, --benchmark | | Run benchmark |
--speed-only | | Return expected speed of the attack and quit |
--progress-only | | Return ideal progress step size and time to process |
-c, --segment-size | Num | Sets size in MB to cache from the wordfile to X | -c
--bitmap-min | Num | Sets minimum bits allowed for bitmaps to X | --bitmap-min=
--bitmap-max | Num | Sets maximum bits allowed for bitmaps to X | --bitmap-max=
--cpu-affinity | Str | Locks to CPU devices, separate with comma | --cpu-affinity=,,
-I, --opencl-info | | Show info about OpenCL platforms/devices detected | -I
--opencl-platforms | Str | OpenCL platforms to use, separate with comma | --opencl-platforms=
-d, --opencl-devices | Str | OpenCL devices to use, separate with comma | -d
-D, --opencl-device-types | Str | OpenCL device-types to use, separate with comma | -D
--opencl-vector-width | Num | Manual override OpenCL vector-width to X | --opencl-vector=
-w, --workload-profile | Num | Enable a specific workload profile, see pool below | -w
-n, --kernel-accel | Num | Manual workload tuning, set outerloop step size to X | -n
-u, --kernel-loops | Num | Manual workload tuning, set innerloop step size to X | -u
--nvidia-spin-damp | Num | Workaround NVidias CPU burning loop bug, in percent | --nvidia-spin-damp=
--gpu-temp-disable | | Disable temperature and fanspeed reads and triggers |
--gpu-temp-abort | Num | Abort if GPU temperature reaches X degrees celsius | --gpu-temp-abort=
--gpu-temp-retain | Num | Try to retain GPU temperature at X degrees celsius | --gpu-temp-retain=
--powertune-enable | | Enable power tuning, restores settings when finished |
--scrypt-tmto | Num | Manually override TMTO value for scrypt to X | --scrypt-tmto=
-s, --skip | Num | Skip X words from the start | -s
-l, --limit | Num | Limit X words from the start + skipped words | -l
--keyspace | | Show keyspace base:mod values and quit |
-j, --rule-left | Rule | Single rule applied to each word from left wordlist | -j 'c'
-k, --rule-right | Rule | Single rule applied to each word from right wordlist | -k '^-'
-r, --rules-file | File | Multiple rules applied to each word from wordlists | -r rules/best64.rule
-g, --generate-rules | Num | Generate X random rules | -g
--generate-rules-func-min | Num | Force min X funcs per rule |
--generate-rules-func-max | Num | Force max X funcs per rule |
--generate-rules-seed | Num | Force RNG seed set to X |
-, --custom-charset1 | CS | User-defined charset ? | - ?l?d?u
-, --custom-charset2 | CS | User-defined charset ? | - ?l?d?s
-, --custom-charset3 | CS | User-defined charset ? |
-, --custom-charset4 | CS | User-defined charset ? |
-i, --increment | | Enable mask increment mode |
--increment-min | Num | Start mask incrementing at X | --increment-min=
--increment-max | Num | Stop mask incrementing at X | --increment-max= - [ Hash modes ] - # | Name | Category
======+==================================================+======================================
| MD4 | Raw Hash
| MD5 | Raw Hash
| Half MD5 | Raw Hash
| SHA1 | Raw Hash
| SHA- | Raw Hash
| SHA- | Raw Hash
| SHA- | Raw Hash
| SHA- | Raw Hash
| SHA-(Keccak) | Raw Hash
| SipHash | Raw Hash
| RipeMD160 | Raw Hash
| Whirlpool | Raw Hash
| GOST R 34.11- | Raw Hash
| GOST R 34.11- (Streebog) -bit | Raw Hash
| GOST R 34.11- (Streebog) -bit | Raw Hash
| md5($pass.$salt) | Raw Hash, Salted and / or Iterated
| md5($salt.$pass) | Raw Hash, Salted and / or Iterated
| md5(unicode($pass).$salt) | Raw Hash, Salted and / or Iterated
| md5($salt.unicode($pass)) | Raw Hash, Salted and / or Iterated
| md5($salt.$pass.$salt) | Raw Hash, Salted and / or Iterated
| md5($salt.md5($pass)) | Raw Hash, Salted and / or Iterated
| md5(md5($pass)) | Raw Hash, Salted and / or Iterated
| md5(strtoupper(md5($pass))) | Raw Hash, Salted and / or Iterated
| md5(sha1($pass)) | Raw Hash, Salted and / or Iterated
| sha1($pass.$salt) | Raw Hash, Salted and / or Iterated
| sha1($salt.$pass) | Raw Hash, Salted and / or Iterated
| sha1(unicode($pass).$salt) | Raw Hash, Salted and / or Iterated
| sha1($salt.unicode($pass)) | Raw Hash, Salted and / or Iterated
| sha1(sha1($pass)) | Raw Hash, Salted and / or Iterated
| sha1($salt.sha1($pass)) | Raw Hash, Salted and / or Iterated
| sha1(md5($pass)) | Raw Hash, Salted and / or Iterated
| sha1($salt.$pass.$salt) | Raw Hash, Salted and / or Iterated
| sha1(CX) | Raw Hash, Salted and / or Iterated
| sha256($pass.$salt) | Raw Hash, Salted and / or Iterated
| sha256($salt.$pass) | Raw Hash, Salted and / or Iterated
| sha256(unicode($pass).$salt) | Raw Hash, Salted and / or Iterated
| sha256($salt.unicode($pass)) | Raw Hash, Salted and / or Iterated
| sha512($pass.$salt) | Raw Hash, Salted and / or Iterated
| sha512($salt.$pass) | Raw Hash, Salted and / or Iterated
| sha512(unicode($pass).$salt) | Raw Hash, Salted and / or Iterated
| sha512($salt.unicode($pass)) | Raw Hash, Salted and / or Iterated
| HMAC-MD5 (key = $pass) | Raw Hash, Authenticated
| HMAC-MD5 (key = $salt) | Raw Hash, Authenticated
| HMAC-SHA1 (key = $pass) | Raw Hash, Authenticated
| HMAC-SHA1 (key = $salt) | Raw Hash, Authenticated
| HMAC-SHA256 (key = $pass) | Raw Hash, Authenticated
| HMAC-SHA256 (key = $salt) | Raw Hash, Authenticated
| HMAC-SHA512 (key = $pass) | Raw Hash, Authenticated
| HMAC-SHA512 (key = $salt) | Raw Hash, Authenticated
| DES (PT = $salt, key = $pass) | Raw Cipher, Known-Plaintext attack
| 3DES (PT = $salt, key = $pass) | Raw Cipher, Known-Plaintext attack
| Skip32 (PT = $salt, key = $pass) | Raw Cipher, Known-Plaintext attack
| phpass | Generic KDF
| scrypt | Generic KDF
| PBKDF2-HMAC-MD5 | Generic KDF
| PBKDF2-HMAC-SHA1 | Generic KDF
| PBKDF2-HMAC-SHA256 | Generic KDF
| PBKDF2-HMAC-SHA512 | Generic KDF
| Skype | Network protocols
| WPA/WPA2 | Network protocols
| iSCSI CHAP authentication, MD5(Chap) | Network protocols
| IKE-PSK MD5 | Network protocols
| IKE-PSK SHA1 | Network protocols
| NetNTLMv1 | Network protocols
| NetNTLMv1 + ESS | Network protocols
| NetNTLMv2 | Network protocols
| IPMI2 RAKP HMAC-SHA1 | Network protocols
| Kerberos AS-REQ Pre-Auth etype | Network protocols
| DNSSEC (NSEC3) | Network protocols
| Cram MD5 | Network protocols
| PostgreSQL CRAM (MD5) | Network protocols
| MySQL CRAM (SHA1) | Network protocols
| SIP digest authentication (MD5) | Network protocols
| Kerberos TGS-REP etype | Network protocols
| SMF (Simple Machines Forum) | Forums, CMS, E-Commerce, Frameworks
| phpBB3 | Forums, CMS, E-Commerce, Frameworks
| vBulletin < v3.8.5 | Forums, CMS, E-Commerce, Frameworks
| vBulletin > v3.8.5 | Forums, CMS, E-Commerce, Frameworks
| MyBB | Forums, CMS, E-Commerce, Frameworks
| IPB (Invison Power Board) | Forums, CMS, E-Commerce, Frameworks
| WBB3 (Woltlab Burning Board) | Forums, CMS, E-Commerce, Frameworks
| Joomla < 2.5. | Forums, CMS, E-Commerce, Frameworks
| Joomla > 2.5. | Forums, CMS, E-Commerce, Frameworks
| Wordpress | Forums, CMS, E-Commerce, Frameworks
| PHPS | Forums, CMS, E-Commerce, Frameworks
| Drupal7 | Forums, CMS, E-Commerce, Frameworks
| osCommerce | Forums, CMS, E-Commerce, Frameworks
| xt:Commerce | Forums, CMS, E-Commerce, Frameworks
| PrestaShop | Forums, CMS, E-Commerce, Frameworks
| Django (SHA-) | Forums, CMS, E-Commerce, Frameworks
| Django (PBKDF2-SHA256) | Forums, CMS, E-Commerce, Frameworks
| Mediawiki B type | Forums, CMS, E-Commerce, Frameworks
| OpenCart | Forums, CMS, E-Commerce, Frameworks
| Redmine | Forums, CMS, E-Commerce, Frameworks
| PunBB | Forums, CMS, E-Commerce, Frameworks
| PostgreSQL | Database Server
| MSSQL() | Database Server
| MSSQL() | Database Server
| MSSQL() | Database Server
| MSSQL() | Database Server
| MySQL323 | Database Server
| MySQL4./MySQL5 | Database Server
| Oracle H: Type (Oracle +) | Database Server
| Oracle S: Type (Oracle +) | Database Server
| Oracle T: Type (Oracle +) | Database Server
| Sybase ASE | Database Server
| EPiServer .x < v4 | HTTP, SMTP, LDAP Server
| EPiServer .x > v4 | HTTP, SMTP, LDAP Server
| Apache $apr1$ | HTTP, SMTP, LDAP Server
| ColdFusion + | HTTP, SMTP, LDAP Server
| hMailServer | HTTP, SMTP, LDAP Server
| nsldap, SHA-(Base64), Netscape LDAP SHA | HTTP, SMTP, LDAP Server
| nsldaps, SSHA-(Base64), Netscape LDAP SSHA | HTTP, SMTP, LDAP Server
| SSHA-(Base64), LDAP {SSHA256} | HTTP, SMTP, LDAP Server
| SSHA-(Base64), LDAP {SSHA512} | HTTP, SMTP, LDAP Server
| CRC32 | Checksums
| LM | Operating-Systems
| NTLM | Operating-Systems
| Domain Cached Credentials (DCC), MS Cache | Operating-Systems
| Domain Cached Credentials (DCC2), MS Cache | Operating-Systems
| MS-AzureSync PBKDF2-HMAC-SHA256 | Operating-Systems
| descrypt, DES(Unix), Traditional DES | Operating-Systems
| BSDiCrypt, Extended DES | Operating-Systems
| md5crypt $$, MD5(Unix) | Operating-Systems
| bcrypt $*$, Blowfish(Unix) | Operating-Systems
| sha256crypt $$, SHA256(Unix) | Operating-Systems
| sha512crypt $$, SHA512(Unix) | Operating-Systems
| OSX v10., OSX v10., OSX v10. | Operating-Systems
| OSX v10. | Operating-Systems
| OSX v10., OSX v10., OSX v10. | Operating-Systems
| AIX {smd5} | Operating-Systems
| AIX {ssha1} | Operating-Systems
| AIX {ssha256} | Operating-Systems
| AIX {ssha512} | Operating-Systems
| Cisco-PIX | Operating-Systems
| Cisco-ASA | Operating-Systems
| Cisco-IOS $$ | Operating-Systems
| Cisco-IOS $$ | Operating-Systems
| Cisco-IOS $$ | Operating-Systems
| Cisco-IOS $$ | Operating-Systems
| Juniper Netscreen/SSG (ScreenOS) | Operating-Systems
| Juniper IVE | Operating-Systems
| Fortigate (FortiOS) | Operating-Systems
| Android PIN | Operating-Systems
| Windows + phone PIN/Password | Operating-Systems
| Citrix Netscaler | Operating-Systems
| RACF | Operating-Systems
| GRUB | Operating-Systems
| Radmin2 | Operating-Systems
| ArubaOS | Operating-Systems
| SAP CODVN B (BCODE) | Enterprise Application Software (EAS)
| SAP CODVN F/G (PASSCODE) | Enterprise Application Software (EAS)
| SAP CODVN H (PWDSALTEDHASH) iSSHA- | Enterprise Application Software (EAS)
| Lotus Notes/Domino | Enterprise Application Software (EAS)
| Lotus Notes/Domino | Enterprise Application Software (EAS)
| Lotus Notes/Domino | Enterprise Application Software (EAS)
| PeopleSoft | Enterprise Application Software (EAS)
| PeopleSoft Token | Enterprise Application Software (EAS)
| -Zip | Archives
| RAR3-hp | Archives
| RAR5 | Archives
| AxCrypt | Archives
| AxCrypt in memory SHA1 | Archives
| WinZip | Archives
| iTunes Backup < 10.0 | Backup
| iTunes Backup >= 10.0 | Backup
62XY | TrueCrypt | Full-Disk encryptions (FDE)
X | = PBKDF2-HMAC-RipeMD160 | Full-Disk encryptions (FDE)
X | = PBKDF2-HMAC-SHA512 | Full-Disk encryptions (FDE)
X | = PBKDF2-HMAC-Whirlpool | Full-Disk encryptions (FDE)
X | = PBKDF2-HMAC-RipeMD160 + boot-mode | Full-Disk encryptions (FDE)
Y | = XTS bit pure AES | Full-Disk encryptions (FDE)
Y | = XTS bit pure Serpent | Full-Disk encryptions (FDE)
Y | = XTS bit pure Twofish | Full-Disk encryptions (FDE)
Y | = XTS bit pure AES | Full-Disk encryptions (FDE)
Y | = XTS bit pure Serpent | Full-Disk encryptions (FDE)
Y | = XTS bit pure Twofish | Full-Disk encryptions (FDE)
Y | = XTS bit cascaded AES-Twofish | Full-Disk encryptions (FDE)
Y | = XTS bit cascaded Serpent-AES | Full-Disk encryptions (FDE)
Y | = XTS bit cascaded Twofish-Serpent | Full-Disk encryptions (FDE)
Y | = XTS bit all | Full-Disk encryptions (FDE)
| Android FDE < v4. | Full-Disk encryptions (FDE)
| Android FDE (Samsung DEK) | Full-Disk encryptions (FDE)
| eCryptfs | Full-Disk encryptions (FDE)
137XY | VeraCrypt | Full-Disk encryptions (FDE)
X | = PBKDF2-HMAC-RipeMD160 | Full-Disk encryptions (FDE)
X | = PBKDF2-HMAC-SHA512 | Full-Disk encryptions (FDE)
X | = PBKDF2-HMAC-Whirlpool | Full-Disk encryptions (FDE)
X | = PBKDF2-HMAC-RipeMD160 + boot-mode | Full-Disk encryptions (FDE)
X | = PBKDF2-HMAC-SHA256 | Full-Disk encryptions (FDE)
X | = PBKDF2-HMAC-SHA256 + boot-mode | Full-Disk encryptions (FDE)
Y | = XTS bit pure AES | Full-Disk encryptions (FDE)
Y | = XTS bit pure Serpent | Full-Disk encryptions (FDE)
Y | = XTS bit pure Twofish | Full-Disk encryptions (FDE)
Y | = XTS bit pure AES | Full-Disk encryptions (FDE)
Y | = XTS bit pure Serpent | Full-Disk encryptions (FDE)
Y | = XTS bit pure Twofish | Full-Disk encryptions (FDE)
Y | = XTS bit cascaded AES-Twofish | Full-Disk encryptions (FDE)
Y | = XTS bit cascaded Serpent-AES | Full-Disk encryptions (FDE)
Y | = XTS bit cascaded Twofish-Serpent | Full-Disk encryptions (FDE)
Y | = XTS bit all | Full-Disk encryptions (FDE)
| LUKS | Full-Disk encryptions (FDE)
| MS Office <= $|$, MD5 + RC4 | Documents
| MS Office <= $|$, MD5 + RC4, collider # | Documents
| MS Office <= $|$, MD5 + RC4, collider # | Documents
| MS Office <= $|$, SHA1 + RC4 | Documents
| MS Office <= $|$, SHA1 + RC4, collider # | Documents
| MS Office <= $|$, SHA1 + RC4, collider # | Documents
| MS Office | Documents
| MS Office | Documents
| MS Office | Documents
| PDF 1.1 - 1.3 (Acrobat - ) | Documents
| PDF 1.1 - 1.3 (Acrobat - ), collider # | Documents
| PDF 1.1 - 1.3 (Acrobat - ), collider # | Documents
| PDF 1.4 - 1.6 (Acrobat - ) | Documents
| PDF 1.7 Level (Acrobat ) | Documents
| PDF 1.7 Level (Acrobat - ) | Documents
| Password Safe v2 | Password Managers
| Password Safe v3 | Password Managers
| Lastpass + Lastpass sniffed | Password Managers
| 1Password, agilekeychain | Password Managers
| 1Password, cloudkeychain | Password Managers
| Bitcoin/Litecoin wallet.dat | Password Managers
| Blockchain, My Wallet | Password Managers
| Keepass (AES/Twofish) and Keepass (AES) | Password Managers
| Plaintext | Plaintext - [ Outfile Formats ] - # | Format
===+========
| hash[:salt]
| plain
| hash[:salt]:plain
| hex_plain
| hash[:salt]:hex_plain
| plain:hex_plain
| hash[:salt]:plain:hex_plain
| crackpos
| hash[:salt]:crack_pos
| plain:crack_pos
| hash[:salt]:plain:crack_pos
| hex_plain:crack_pos
| hash[:salt]:hex_plain:crack_pos
| plain:hex_plain:crack_pos
| hash[:salt]:plain:hex_plain:crack_pos - [ Rule Debugging Modes ] - # | Format
===+========
| Finding-Rule
| Original-Word
| Original-Word:Finding-Rule
| Original-Word:Finding-Rule:Processed-Word - [ Attack Modes ] - # | Mode
===+======
| Straight
| Combination
| Brute-force
| Hybrid Wordlist + Mask
| Hybrid Mask + Wordlist - [ Built-in Charsets ] - ? | Charset
===+=========
l | abcdefghijklmnopqrstuvwxyz
u | ABCDEFGHIJKLMNOPQRSTUVWXYZ
d |
h | 0123456789abcdef
H | 0123456789ABCDEF
s | !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~
a | ?l?u?d?s
b | 0x00 - 0xff - [ OpenCL Device Types ] - # | Device Type
===+=============
| CPU
| GPU
| FPGA, DSP, Co-Processor - [ Workload Profiles ] - # | Performance | Runtime | Power Consumption | Desktop Impact
===+=============+=========+===================+=================
| Low | ms | Low | Minimal
| Default | ms | Economic | Noticeable
| High | ms | High | Unresponsive
| Nightmare | ms | Insane | Headless - [ Basic Examples ] - Attack- | Hash- |
Mode | Type | Example command
==================+=======+==================================================================
Wordlist | $P$ | hashcat -a -m example400.hash example.dict
Wordlist + Rules | MD5 | hashcat -a -m example0.hash example.dict -r rules/best64.rule
Brute-Force | MD5 | hashcat -a -m example0.hash ?a?a?a?a?a?a
Combinator | MD5 | hashcat -a -m example0.hash example.dict example.dict If you still have no idea what just happened try following pages: * https://hashcat.net/wiki/#howtos_videos_papers_articles_etc_in_the_wild
* https://hashcat.net/wiki/#frequently_asked_questions
使用Hashcat破解WPA/PSK密码
首先要把airodump抓取的cap文件转化为hccap格式, 可以在线转换, 在线转换的地址:https://hashcat.net/cap2hccap/, 也可以用aircrack-ng转换
aircrack-ng <out.cap> -J <out.hccap>
使用hashcat命令,第一个参数: -m 2500为破解的模式为WPA/PSK方式 ,第二个参数: hccap格式的文件是刚刚转化好的文件, 第三个参数: dics.txt为字典文件 :
hashcat -m out.hccap.hccap dics.txt
破解的进度通过按键盘上的 s 键即可查看:
破纯数字密码
hashcat -m -a handshake.hccap ?d?d?d?d?d?d?d?d
?d?d?d?d?d?d?d?d代表8为数字
使用crunch生成字典破解
kali系统中,通过crunch生成字典, 我要生成8位纯数字的字典,使用以下命令, 8 8 代表最小位数为8为, 第二个8代表最大位数也为8为, 0123456789为字典中的数字 , -o dic.txt说明要把字典生成到dic.txt, 生成的纯数字字典有900M:
crunch -o dic.txt
最后祝你好运,6666
参考:
hashcat官网:https://hashcat.net/hashcat/
Cracking WPA/WPA2 with oclHashcat:https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2
在线cap转为hccapx格式:https://hashcat.net/cap2hccapx/
git:https://github.com/hashcat/hashcat
0-9 8位纯数密码.rar:http://vdisk.weibo.com/s/v3c8-ph-6IAK/1438713183
作者: NONO
出处:http://www.cnblogs.com/diligenceday/
企业网站:http://www.idrwl.com/
开源博客:http://www.github.com/sqqihao
QQ:287101329
微信:18101055830
用Hashcat每秒计算1.4亿个密码,破解隔壁WIFI密码的更多相关文章
- 中国最强AI超级服务器问世,每秒提供AI计算2000万亿次
https://mp.weixin.qq.com/s/1EVczHp11OJ4GEjeE3z5cA 业内唯一以“AI计算”为核心的人工智能大会昨天发布了一份重要报告. 9月12日,<中国AI计算 ...
- 每秒高达1.6亿次操作的并发键值存储库 FASTER 诞生
FASTER 在过去十年中,云中的数据密集型应用程序和服务有了巨大的增长.数据在各种边设施(例如,设备,浏览器和服务器)上创建,并由云应用程序处理用来获得数据价值或做出决策.应用程序和服务可以处理收集 ...
- hashcat 密码破解工具 使用教程
日期:2019-08-16 15:03:12 更新: 作者:Bay0net 介绍:记录一下 hashcat 的使用命令 0x01.Install Hashcat Wiki - FAQ Github - ...
- WiFi密码新攻击破解方法,黑客攻破只需10秒
近日,中国知名黑客安全组织东方联盟研究人员透露了一种新的WiFi黑客技术,使黑客更容易破解大多数现代路由器的WiFi密码,并且攻破只需要10秒,速度非常快. 方法是利用由流行的密码破解工具Hashca ...
- PCB特征阻抗计算神器Polar SI9000安装及破解指南
近年来,IC集成度的提高和应用,其信号传输频率和速度越来越高,因而在印制板导线中,信号传输(发射)高到某一定值后,便会受到印制板导线本身的影响,从而导致传 输信号的严重失真或完全丧失.这表明,PCB导 ...
- 转 DataTorrent 1.0每秒处理超过10亿个实时事件
DataTorrent是一个实时的流式处理和分析平台,它每秒可以处理超过10亿个实时事件. 与Twitter平均每秒大约6000条微博相比,最近发布的DataTorrent 1.0似乎已经超出了需求, ...
- PHP根据秒计算持续时长
/** * 计算持续时长 * * @param int $second 秒数 * @return string $duration 5天10小时43分钟40秒 */ function second2d ...
- Java 实现倒计时(由秒计算天、小时、分钟、秒)
public class Countdown4 { private static long day = 0; private static long hour = 0; private static ...
- SQL SERVER数据库,按年、月、日、时、分、秒计算两个时间字段之间的间隔时间样例
使用DATEDIFF(取值,时间字段1,时间字段2) 举例: SELECT DATEDIFF(YEAR,DRYSJ,DCYSJ),* FROM YXHIS2019..TBZYBR2019 --SQL ...
随机推荐
- eclipse创建android项目,无法正常预览布局文件
http://jingyan.baidu.com/article/d621e8da0e0e052865913fae.html
- iOS 数字每隔3位添加一个逗号的
+(NSString *)countNumAndChangeformat:(NSString *)num { ; long long int a = num.longLongValue; ) { co ...
- “canvas画布仿window系统自带画图软件"项目的思考
"canvas画布仿window系统自带画图软件"项目的思考 首先贴上DEMO图,并没有美化效果.对UI有要求的,请自带补脑技术. 思考一 在做项目的过程中,我发现"工具 ...
- Redis详解
转自:http://blog.csdn.net/eroswang/article/details/7080412 1. MySql+Memcached架构的问题 1.MySQL需要不断进行拆库拆表, ...
- POJ 2373 Yogurt factory
简单DP. 这周所用的实际花费是上一周的花费+S与这周费用的较小值. #include<cstdio> #include<cstring> #include<cmath& ...
- $smary模板缓存
<?php //引入配置文件 $fillname="../cache/testhuancun.html"; //设置一个缓存时间 $time=; //判断如果缓存文件不存在的 ...
- Mybatis学习(6)动态加载、一二级缓存
一.动态加载: resultMap可以实现高级映射(使用association.collection实现一对一及一对多映射),association.collection具备延迟加载功能. 需求: 如 ...
- centos6.6-------DHCP服务配置
一.为一个单一的网段提供地址服务 软件包: dhcp配置文件: /etc/dhcp/dhcpd.conf租约文件: /var/lib/dhcpd/dhcpd.leases监听端口: ...
- android——网络操作(一)连接网络
连接网络 一,包含许可 <uses-permissionandroid:name="android.permission.INTERNET"/> <uses-pe ...
- 【Xilinx-Petalinux学习】-08-OpenAMP系统实现
openAMP系统实现. 一个核跑Linux,一个核裸跑. -----> 已经实现. 一个核跑Linux,一个核跑UCOS -----> 还未实现. Micrium的uco ...