# hashcat ## session與restore ### 1. 破解開始,宣告session  ``` hashcat -m 1000 -a 3 win_user_NTLM --session win_user_ntlm_seesion ``` - 指定session名稱為Hashcat_session_name ### 2. 回復破解進度 -  ``` hashcat -session win_user_ntlm_seesion --restore ``` - 恢復session ## 破解 NTLM ``` hashcat -m 1000 -a 3 win_user_NTLM --session win_user_ntlm_seesion ``` ### hashcat參數介紹 -m 指定模式 1000为ntlm v1 5600位ntlm v2 -a 指定破解模式 0位字典破解 然后后面为ntlm hash和字典 ``` ?l 代表小写字母 ?u 代表大写字母 ?d 代表数字 ?s 代表特殊字符 ?a 代表大小写字母、数字以及特殊字符 ?b 0x00-0xff ``` ``` 0 straight 字典破解 1 combination 将字典中密码进行组合(1 2 ——> 11 22 12 21) 3 brute-force 使用指定掩码破解 6 Hybrid Wordlist + Mask 字典+掩码破解 7 Hybrid Mask + Wordlist 掩码+字典破解 ```
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up