mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-12 22:33:00 +00:00
Update Active Directory Attack.md
Correcting typo Removing dead website Adjusting techniques
This commit is contained in:
parent
c89976d1b0
commit
76ec08cfb4
1 changed files with 8 additions and 5 deletions
|
@ -1254,14 +1254,15 @@ Useful when you want to have the clear text password or when you need to make st
|
||||||
|
|
||||||
Recommended wordlists:
|
Recommended wordlists:
|
||||||
- rockyou (available in Kali Linux)
|
- rockyou (available in Kali Linux)
|
||||||
- Have I Been Powned (https://hashes.org/download.php?hashlistId=7290&type=hfound)
|
- Have I Been Pwned founds (https://hashmob.net/hashlists/info/4169-Have%20I%20been%20Pwned%20V8%20(NTLM))
|
||||||
- Collection #1 (passwords from Data Breaches, might be illegal to possess)
|
- Weakpass.com
|
||||||
|
- Read More at [Methodology and Resources/Hash Cracking.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Hash%20Cracking.md)
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
# Basic wordlist
|
# Basic wordlist
|
||||||
# (-O) will Optimize for 32 characters or less passwords
|
# (-O) will Optimize for 32 characters or less passwords
|
||||||
# (-w 4) will set the workload to "Insane"
|
# (-w 4) will set the workload to "Insane"
|
||||||
$ hashcat64.exe -m 1000 -w 4 -O -a 0 -o pathtopotfile pathtohashes pathtodico -r ./rules/best64.rule --opencl-device-types 1,2
|
$ hashcat64.exe -m 1000 -w 4 -O -a 0 -o pathtopotfile pathtohashes pathtodico -r myrules.rule --opencl-device-types 1,2
|
||||||
|
|
||||||
# Generate a custom mask based on a wordlist
|
# Generate a custom mask based on a wordlist
|
||||||
$ git clone https://github.com/iphelix/pack/blob/master/README
|
$ git clone https://github.com/iphelix/pack/blob/master/README
|
||||||
|
@ -1270,7 +1271,9 @@ $ python2 maskgen.py hashcat.mask --targettime 3600 --optindex -q -o hashcat_1H.
|
||||||
```
|
```
|
||||||
|
|
||||||
:warning: If the password is not a confidential data (challenges/ctf), you can use online "cracker" like :
|
:warning: If the password is not a confidential data (challenges/ctf), you can use online "cracker" like :
|
||||||
- [hashes.org](https://hashes.org/check.php)
|
- ~~[hashes.org](https://hashes.org/check.php)~~
|
||||||
|
- [hashmob.net](https://hashmob.net)
|
||||||
|
- [crackstation.net](https://crackstation.net)
|
||||||
- [hashes.com](https://hashes.com/en/decrypt/hash)
|
- [hashes.com](https://hashes.com/en/decrypt/hash)
|
||||||
|
|
||||||
### Password spraying
|
### Password spraying
|
||||||
|
|
Loading…
Reference in a new issue