- Joined
- Aug 19, 2023
- Messages
- 911
- Reaction score
- 39,803
- Points
- 93
- Thread Author
- #1
Leave a like Please .
Tutorial by me ^^ | It took me 3 hours to write this
so please do not repost !
Required files
Hashcat : hashcat - advanced password recovery
Combolist : https://ghostbin.co/paste/v2ofw
Password list : File on MEGA
Preparation
1. Open your hashcat file
Screenshot
2. Put your combolist (use mine for the example) and name it "hashes.txt"
Screenshot
3. Put your password list and name it "rockyou.txt"
Screenshot
4. Copy the repertory
Screenshot
5. Open cmd
Screenshot
6. Open the repertory in cmd with " cd "repertory" "
Screenshot
If your repertory is not in C: write the name of your Hard disk : "d:" / "f:" / "j:" before !
Decrypt your combo
We will start by decrypting with our password list (do this step in first !!! this is the quickest way !!) :
First of all, please analayze your hash type, you can do that on internet :
Hash Analyzer - TunnelsUP
Online Hash type Identifier
Online Free Hash Identification identifier: find 250+ algorithms | Online Hash Crack
If your hash is md5, you can continue, if it's something else, read the third spoiler.
Screenshot
Write the command "hashcat64.exe -a 0 -m 0 hashes.txt rockyou.txt --username --outfile temporary.txt"
Screenshot
Then, we will bruteforce last hashes Wooow (no worry this do not take so much time)
The command is "hashcat64.exe -a 3 -m 0 hashes.txt ?a?a?a?a --username --outfile temporary.txt"
Screenshot
In order to decrypt all your hashes, add one "?a" when you want to add one character to your bruteforce :
"?a?a?a?a" will decrypt only passwords with 4 letters/numbers
"?a?a?a?a?a?a" will decrypt only passwords with 6 letters/numbers"
(more there is charachter, more it will take you time"
So if you want to find all hashes with my example, try with 4 / 5 / 6 characters !
I think you noticed that we named the output file "temporary.txt"
If I named it like that it's because if you look at in, you will have hash:password" and we want "email:password"
Screenshot
So write this command : "hashcat64.exe -a 3 -m 0 hashes.txt ?a?a?a?a?a?a?a?a --show --username --outfile-format 2 --outfile combolist.txt"
(modify the number of "?a" do not change your result)
Screenshot
And there you go ! You have your decrypted combolist !!
Your email:pass combo is in combolist.txt
Screenshot
PLEASE READ THIS !!!!
In your command, you can see "-m 0" each time, this correspond to the hash type (here md5)
If you want to change it, type "hashcat64.exe --help" and search your hash number
Finnaly, replace "-m 0" by "-m yournumber"
Tutorial by me ^^ | It took me 3 hours to write this
so please do not repost !
Required files
Hashcat : hashcat - advanced password recovery
Combolist : https://ghostbin.co/paste/v2ofw
Password list : File on MEGA
Preparation
1. Open your hashcat file
Screenshot
2. Put your combolist (use mine for the example) and name it "hashes.txt"
Screenshot
3. Put your password list and name it "rockyou.txt"
Screenshot
4. Copy the repertory
Screenshot
5. Open cmd
Screenshot
6. Open the repertory in cmd with " cd "repertory" "
Screenshot
If your repertory is not in C: write the name of your Hard disk : "d:" / "f:" / "j:" before !
Decrypt your combo
We will start by decrypting with our password list (do this step in first !!! this is the quickest way !!) :
First of all, please analayze your hash type, you can do that on internet :
Hash Analyzer - TunnelsUP
Online Hash type Identifier
Online Free Hash Identification identifier: find 250+ algorithms | Online Hash Crack
If your hash is md5, you can continue, if it's something else, read the third spoiler.
Screenshot
Write the command "hashcat64.exe -a 0 -m 0 hashes.txt rockyou.txt --username --outfile temporary.txt"
Screenshot
Then, we will bruteforce last hashes Wooow (no worry this do not take so much time)
The command is "hashcat64.exe -a 3 -m 0 hashes.txt ?a?a?a?a --username --outfile temporary.txt"
Screenshot
In order to decrypt all your hashes, add one "?a" when you want to add one character to your bruteforce :
"?a?a?a?a" will decrypt only passwords with 4 letters/numbers
"?a?a?a?a?a?a" will decrypt only passwords with 6 letters/numbers"
(more there is charachter, more it will take you time"
So if you want to find all hashes with my example, try with 4 / 5 / 6 characters !
I think you noticed that we named the output file "temporary.txt"
If I named it like that it's because if you look at in, you will have hash:password" and we want "email:password"
Screenshot
So write this command : "hashcat64.exe -a 3 -m 0 hashes.txt ?a?a?a?a?a?a?a?a --show --username --outfile-format 2 --outfile combolist.txt"
(modify the number of "?a" do not change your result)
Screenshot
And there you go ! You have your decrypted combolist !!
Your email:pass combo is in combolist.txt
Screenshot
PLEASE READ THIS !!!!
In your command, you can see "-m 0" each time, this correspond to the hash type (here md5)
If you want to change it, type "hashcat64.exe --help" and search your hash number
Finnaly, replace "-m 0" by "-m yournumber"