From a26291011534c4bb0997b00926d1365da9af01bf Mon Sep 17 00:00:00 2001 From: stephensottosanti <63934523+stephensottosanti@users.noreply.github.com> Date: Fri, 19 Feb 2021 14:42:53 -0600 Subject: [PATCH] Update README.md --- TOTW/README.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/TOTW/README.md b/TOTW/README.md index 3e04d25..b2c6743 100644 --- a/TOTW/README.md +++ b/TOTW/README.md @@ -6,9 +6,9 @@ Meeting on 2/18/21
Hashcat
"Hashact is a popular password cracker and is designed to break even the most complex passwords. For example, let's say you are given a password that has been hashed using md5 (71b816fe0b7b763d889ecc227eab400a) and you know the format of the password you have is "SKY-HQNT-" followed by 4 digits then you can use hashcat to brute force it and find out what the entire password is. Using the following command will get you the answer:
hashcat -m 0 -a 3 ./.txt 'SKY-HQNT-?d?d?d?d'
- m is for mode and 0 is mode md5
- a is for action and 3 is for brute force
- hash file is the text file where you are storing the hashed password"
+- m is for mode and 0 is mode md5
+- a is for action and 3 is for brute force
+- hash file is the text file where you are storing the hashed password"
Percy Knox ----