Anthropic-Cybersecurity-Skills performing-hash-cracking-with-hashcat

Hash cracking is an essential skill for penetration testers and security auditors to evaluate password strength.

install
source · Clone the upstream repo
git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/mukul975/Anthropic-Cybersecurity-Skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/performing-hash-cracking-with-hashcat" ~/.claude/skills/mukul975-anthropic-cybersecurity-skills-performing-hash-cracking-with-hashcat && rm -rf "$T"
manifest: skills/performing-hash-cracking-with-hashcat/SKILL.md
source content

Performing Hash Cracking with Hashcat

Overview

Hash cracking is an essential skill for penetration testers and security auditors to evaluate password strength. Hashcat is the world's fastest password recovery tool, supporting over 300 hash types with GPU acceleration. This skill covers using hashcat for authorized password auditing, understanding attack modes, creating effective rule sets, and generating hash analysis reports. This is strictly for authorized penetration testing and password policy assessment.

When to Use

  • When conducting security assessments that involve performing hash cracking with hashcat
  • When following incident response procedures for related security events
  • When performing scheduled security testing or auditing activities
  • When validating security controls through hands-on testing

Prerequisites

  • Familiarity with cryptography concepts and tools
  • Access to a test or lab environment for safe execution
  • Python 3.8+ with required dependencies installed
  • Appropriate authorization for any testing activities

Objectives

  • Identify hash types from captured hashes
  • Execute dictionary, brute-force, and rule-based attacks
  • Create custom hashcat rules for targeted cracking
  • Analyze password strength from cracking results
  • Generate compliance reports on password policy effectiveness
  • Benchmark GPU performance for hash cracking

Key Concepts

Hashcat Attack Modes

ModeFlagDescriptionUse Case
Dictionary-a 0Wordlist attackKnown password patterns
Combination-a 1Combine two wordlistsCompound passwords
Brute-force-a 3Mask-based enumerationShort passwords
Rule-based-a 0 -rDictionary + transformation rulesComplex variations
Hybrid-a 6/7Wordlist + maskPasswords with appended numbers

Common Hash Types

Hash ModeTypeExample Use
0MD5Legacy web apps
100SHA-1Legacy systems
1000NTLMWindows credentials
1800sha512cryptLinux /etc/shadow
3200bcryptModern web apps
13100Kerberos TGS-REPActive Directory

Security Considerations

  • Only perform hash cracking with explicit written authorization
  • Secure all captured hash data in transit and at rest
  • Report all cracked passwords immediately to asset owners
  • Use results to improve password policies, not exploit users
  • Destroy cracked password data after engagement concludes
  • Follow rules of engagement for penetration test scope

Validation Criteria

  • Hash type identification is correct
  • Dictionary attack cracks weak passwords
  • Rule-based attack cracks policy-compliant passwords
  • Mask attack cracks short passwords
  • Results report shows password strength distribution
  • All operations performed within authorized scope