• We just launched and are currently in beta. Join us as we build and grow the community.

How to Decrypt your Combo with Hashcat | Ultimate guide | Full Tutorial |

Jules

Microservice Integrator
J Rep
0
0
0
Rep
0
J Vouches
0
0
0
Vouches
0
Posts
134
Likes
85
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
Leave a like and don't leech !

Tutorial by me ^^ | It took me 3 hours to write this
so please do not repost !


Required files

Hashcat :https://hashcat.net/hashcat/

Combolist :https://ghostbin.co/paste/v2ofw

Password list :

You must upgrade your account or reply in the thread to view hidden text.





Preparation

1. Open your hashcat file https://prnt.sc/svdu8i 2. Put your combolist (use mine for the example) and name it "hashes.txt" https://prnt.sc/svdutk 3. Put your password list and name it "rockyou.txt" https://prnt.sc/svdv8a 4. Copy the repertory https://prnt.sc/svdwaf 5. Open cmd https://prnt.sc/svdxlz 6. Open the repertory in cmd with "cd "repertory"" https://prnt.sc/svdz9h If your repertory is not in C: write the name of your Hard disk :"d:" / "f:" / "j:"before !

Decrypt your combo

We will start by decrypting with our password list (do this step in first !!! this is the quickest way !!) :

First of all, please analayze your hash type, you can do that on internet :

If your hash is md5, you can continue, if it's something else, read the third . https://prnt.sc/sve039
Write the command "hashcat64.exe -a 0 -m 0 hashes.txt rockyou.txt --username --outfile temporary.txt" https://prnt.sc/sve0ty
Then, we will bruteforce last hashes (no worry this do not take so much time)

The command is "hashcat64.exe -a 3 -m 0 hashes.txt ?a?a?a?a --username --outfile temporary.txt" https://prnt.sc/sve29i
In order to decrypt all your hashes, add one "?a" when you want to add one character to your bruteforce :
"?a?a?a?a" will decrypt only passwords with 4 letters/numbers
"?a?a?a?a?a?a" will decrypt only passwords with 6 letters/numbers"
(more there is charachter, more it will take you time"

So if you want to find all hashes with my example, try with 4 / 5 / 6 characters !

I think you noticed that we named the output file "temporary.txt"
If I named it like that it's because if you look at in, you will have hash:password" and we want "email:password" https://prnt.sc/sve47k So write this command : "hashcat64.exe -a 3 -m 0 hashes.txt ?a?a?a?a?a?a?a?a --show --username --outfile-format 2 --outfile combolist.txt"
(modify the number of "?a" do not change your result) https://prnt.sc/sve4pt

And there you go ! You have your decrypted combolist !!

Your email:pass combo is in combolist.txt

https://prnt.sc/sve5ir



PLEASE READ THIS !!!!

In your command, you can see "-m 0" each time, this correspond to the hash type (here md5)
If you want to change it, type "hashcat64.exe --help" and search your hash number
Finnaly, replace "-m 0" by "-m yournumber"
 

422,212

310,551

310,560

Top