Skills hashcat
install
source · Clone the upstream repo
git clone https://github.com/TerminalSkills/skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/TerminalSkills/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/hashcat" ~/.claude/skills/terminalskills-skills-hashcat && rm -rf "$T"
manifest:
skills/hashcat/SKILL.mdsource content
Hashcat
Overview
Hashcat is the fastest password hash cracker — 300+ hash modes, native GPU support (CUDA/OpenCL/Metal), and an attack language that covers wordlists, rules, masks, and hybrid combinations. Each hash type is referenced by a mode number (e.g.,
-m 1000 for NTLM, -m 3200 for bcrypt, -m 22000 for WPA2). Pair with dedicated hardware — cracking on a laptop iGPU is rarely worth it.
Instructions
Step 1: Identify the Hash Mode
# Search by example hashcat --example-hashes | grep -B1 -A2 'bcrypt' # MODE: 3200 # TYPE: bcrypt $2*$, Blowfish (Unix) # HASH: $2a$05$LhayLxezLhK1LhWvKxCyLOj0j1u... # Common modes worth memorizing # 0 MD5 # 100 SHA1 # 1000 NTLM # 1400 SHA2-256 # 1800 sha512crypt ($6$) # 3200 bcrypt ($2a$) # 5600 NetNTLMv2 # 7500 Kerberos 5 AS-REQ (krb5pa) # 13100 Kerberos 5 TGS-REP (Kerberoasting) # 22000 WPA-PBKDF2-PMKID+EAPOL
Step 2: Pick an Attack Mode
# -a 0 straight (wordlist) # -a 1 combination (wordlist1 + wordlist2) # -a 3 brute-force / mask # -a 6 hybrid wordlist + mask # -a 7 hybrid mask + wordlist # Straight wordlist hashcat -m 1000 ntlm.hash /usr/share/wordlists/rockyou.txt # Wordlist + rules (biggest single ROI) hashcat -m 1000 ntlm.hash rockyou.txt -r /usr/share/hashcat/rules/best64.rule # Mask — 8 chars: Upper, 5 lower, 2 digits hashcat -m 1000 ntlm.hash -a 3 '?u?l?l?l?l?l?d?d' # Hybrid: rockyou word + 4-digit year suffix hashcat -m 1000 ntlm.hash -a 6 rockyou.txt '?d?d?d?d'
Step 3: Run with Sensible Flags
hashcat -m 1000 \ -a 0 \ -w 3 \ --status --status-timer=30 \ --session engagement-2026-04 \ --potfile-path ./engagement.pot \ -o cracked.txt \ ntlm.hash rockyou.txt -r best64.rule # -w 3 workload profile (1=desktop, 3=headless, 4=insane) # --session named session so you can pause/resume # --potfile-path isolate cracked hashes per engagement # -o write cracked results to file # --status periodic progress line
Step 4: Pause, Resume, and Monitor
# Interactive keys while running: # [s]tatus [p]ause [b]ypass [c]heckpoint [q]uit # Resume by session name hashcat --session engagement-2026-04 --restore # Show previously cracked hashes hashcat -m 1000 ntlm.hash --show # aabb...cc:Summer2026! # Show only still-uncracked hashcat -m 1000 ntlm.hash --left > still-to-crack.hash
Step 5: Benchmark and Tune
# Benchmark every mode hashcat -b # Benchmark a specific mode hashcat -b -m 22000 # Deal with thermal throttling on consumer GPUs hashcat -m 1000 ntlm.hash rockyou.txt -w 3 --hwmon-temp-abort=90 # Multiple GPUs — list and select hashcat -I hashcat -m 1000 ntlm.hash rockyou.txt -d 1,2
Examples
Example 1: Kerberoasting TGS Hashes
# After running impacket's GetUserSPNs (during an authorized engagement) cat tgs.hash # $krb5tgs$23$*user$DOMAIN$svc/host*$checksum$payload hashcat -m 13100 tgs.hash /usr/share/wordlists/rockyou.txt \ -r /usr/share/hashcat/rules/OneRuleToRuleThemAll.rule \ --session kerberoast-acme \ -o cracked-svc.txt hashcat -m 13100 tgs.hash --show # $krb5tgs$23$...:Service#2024
Example 2: WPA2 Handshake (Own Network)
# Convert your capture hcxpcapngtool -o wifi.hc22000 home-01.cap # Attack with rockyou + best64 hashcat -m 22000 wifi.hc22000 /usr/share/wordlists/rockyou.txt \ -r /usr/share/hashcat/rules/best64.rule \ --status --status-timer=10 \ --session home-wifi # Show the recovered passphrase hashcat -m 22000 wifi.hc22000 --show # abcdef1234567890:aabbccddeeff:...:MyHomePass2026
Guidelines
- Authorization is required. Cracking hashes you do not own or have written permission to test is illegal.
- Always confirm the mode number before running —
is authoritative,hashcat --example-hashes
is a quick guess.hashid - Rules are high-leverage: a 14K-word list +
covers more than a 10M-word flat list. Start there.best64.rule - Separate pot files per engagement (
). The default global potfile bleeds context across clients.--potfile-path ./engagement.pot - Fast hashes (NTLM, MD5, SHA1) complete in minutes on a single GPU. Slow hashes (bcrypt, argon2, sha512crypt) may take days — lean on targeted wordlists and rules, not brute force.
is the right default when no one is using the GUI.-w 3
(insane) makes the system unusable.-w 4- Recent mode changes: WPA PMKID/EAPOL is now
; the older-m 22000
and-m 2500
are deprecated.-m 16800 - On cloud GPU instances, write the session and potfile to persistent storage — preemption wipes local disk.