From 0e157d59a79643ae6f25226b0c2c4830ca5de2ff Mon Sep 17 00:00:00 2001
From: stephensottosanti <63934523+stephensottosanti@users.noreply.github.com>
Date: Fri, 19 Feb 2021 14:43:41 -0600
Subject: [PATCH] Update README.md
---
TOTW/README.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/TOTW/README.md b/TOTW/README.md
index e6addb5..7f0a442 100644
--- a/TOTW/README.md
+++ b/TOTW/README.md
@@ -4,11 +4,11 @@ Every week someone from the competition team will look into a tool used for solv
# TOTW
Meeting on 2/18/21
Hashcat
-"Hashact is a popular password cracker and is designed to break even the most complex passwords. For example, let's say you are given a password that has been hashed using md5 (71b816fe0b7b763d889ecc227eab400a) and you know the format of the password you have is "SKY-HQNT-" followed by 4 digits then you can use hashcat to brute force it and find out what the entire password is. Using the following command will get you the answer:
+"Hashact is a popular password cracker and is designed to break even the most complex passwords. For example, let's say you are given a password that has been hashed using md5 (71b816fe0b7b763d889ecc227eab400a) and you know the format of the password you have is "SKY-HQNT-" followed by 4 digits then you can use hashcat to brute force it and find out what the entire password is. Using the following command will get you the answer:"
hashcat -m 0 -a 3 ./.txt 'SKY-HQNT-?d?d?d?d'
- m is for mode and 0 is mode md5
- a is for action and 3 is for brute force
-- hash file is the text file where you are storing the hashed password"
+- hash file is the text file where you are storing the hashed password
Percy Knox