Hashcat एक world's fastest password recovery tool है जो GPU (Graphics Processing Unit) का use करके hashes crack करता है। यह CPU-based tools से 100x तेज़ हो सकता है।
👉 GPU-accelerated password cracking का #1 tool — 200+ hash algorithms support करता है।
🔑 Hashcat क्या-क्या कर सकता है
GPU Acceleration
Graphics card से super fast cracking
200+ Hash Types
MD5, SHA, bcrypt, WPA, NTLM आदि
WPA/WPA2 Cracking
WiFi handshake capture crack
Wordlist Attack
Dictionary-based fast cracking
Mask Attack
Pattern-based password guessing
Distributed Attack
Multiple GPUs parallel processing
⚙️ Kali NetHunter / Termux में Hashcat install
System Update
apt updateInstall Hashcat
apt install hashcatVerify Installation
hashcat --versionCheck GPU Support
hashcat -I💻 Basic Commands (Use)
👉 Commands को एक-एक करके use कर सकते हो:
MD5 Hash Crack (Mode 0)
hashcat -m 0 -a 0 hash.txt /usr/share/wordlists/rockyou.txtSHA1 Hash Crack (Mode 100)
hashcat -m 100 -a 0 hash.txt /usr/share/wordlists/rockyou.txtShow Cracked Passwords
hashcat -m 0 hash.txt --showMask Attack (8 digits)
hashcat -m 0 -a 3 hash.txt ?d?d?d?d?d?d?d?dWPA/WPA2 Crack
hashcat -m 2500 -a 0 capture.hccapx /usr/share/wordlists/rockyou.txt🌐 Real Example (Practical समझ)
First, create hash file:
echo "5f4dcc3b5aa765d61d8327deb882cf99" > hash.txt(This is MD5 hash of "password")
Crack the hash with Hashcat:
hashcat -m 0 -a 0 hash.txt /usr/share/wordlists/rockyou.txt👉 -m 0 = MD5, -a 0 = Wordlist attack mode
मान लो output कुछ ऐसा आता है:
🧠 इसका मतलब:
Password Found!
hash: 5f4dcc3b...cf99 → password: "password"
Complete Success
1 out of 1 hashes successfully cracked
Hardware Used
12 cores CPU (or GPU if available)
👉 Hashcat की power यहाँ दिखती है:
- • GPU पर 100M+ passwords/sec possible
- • CPU पर भी बहुत fast है compared to other tools
- • Advanced modes और rules से success rate बढ़ती है
🔥 Attack Modes (Important)
Attack Mode 0: Straight (Wordlist)
hashcat -m 0 -a 0 hash.txt wordlist.txtDictionary attack — wordlist से passwords try करता है
Attack Mode 1: Combination
hashcat -m 0 -a 1 hash.txt word1.txt word2.txtTwo wordlists combine करके passwords generate करता है
Attack Mode 3: Brute Force (Mask)
hashcat -m 0 -a 3 hash.txt ?l?l?l?d?d?dPattern-based: ?l=lowercase, ?d=digit, ?u=uppercase, ?s=special
Attack Mode 6: Hybrid (Wordlist + Mask)
hashcat -m 0 -a 6 hash.txt wordlist.txt ?d?d?dWordlist के आगे digits add करता है
👉 Mode 0 (Wordlist) सबसे common है → शुरुआत में इसी use करो
बिना permission किसी भी hash को crack करना illegal है
Practice के लिए use करो:
- अपने own passwords के hashes test करो
- CTF challenges और practice platforms
- Authorized penetration testing scenarios
⚡ GPU Temperature: Long running attacks GPU को गर्म कर सकते हैं। Monitor temperature और use cooling!
🧩 Related Tools
John the Ripper
CPU-based cracking
Hydra
Online password attacks
CeWL
Custom wordlist generator
Crunch
Pattern-based generator
Hashcat = "Super Computer Cracker"
यह normal CPU की जगह GPU use करके 100x तेज़ crack करता है — जैसे racing car vs bicycle की speed difference।