Jules
Microservice Integrator
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
300 XP
Leave a like and don't leech !
Tutorial by me ^^ | It took me 3 hours to write this
so please do not repost !
Required files
Hashcat :https://hashcat.net/hashcat/
Combolist :https://ghostbin.co/paste/v2ofw
Password list :
Preparation
1. Open your hashcat file https://prnt.sc/svdu8i 2. Put your combolist (use mine for the example) and name it "hashes.txt" https://prnt.sc/svdutk 3. Put your password list and name it "rockyou.txt" https://prnt.sc/svdv8a 4. Copy the repertory https://prnt.sc/svdwaf 5. Open cmd https://prnt.sc/svdxlz 6. Open the repertory in cmd with "cd "repertory"" https://prnt.sc/svdz9h If your repertory is not in C: write the name of your Hard disk :"d:" / "f:" / "j:"before !
Decrypt your combo
We will start by decrypting with our password list (do this step in first !!! this is the quickest way !!) :
First of all, please analayze your hash type, you can do that on internet :
If your hash is md5, you can continue, if it's something else, read the third . https://prnt.sc/sve039
Write the command "hashcat64.exe -a 0 -m 0 hashes.txt rockyou.txt --username --outfile temporary.txt" https://prnt.sc/sve0ty
Then, we will bruteforce last hashes (no worry this do not take so much time)
The command is "hashcat64.exe -a 3 -m 0 hashes.txt ?a?a?a?a --username --outfile temporary.txt" https://prnt.sc/sve29i
In order to decrypt all your hashes, add one "?a" when you want to add one character to your bruteforce :
"?a?a?a?a" will decrypt only passwords with 4 letters/numbers
"?a?a?a?a?a?a" will decrypt only passwords with 6 letters/numbers"
(more there is charachter, more it will take you time"
So if you want to find all hashes with my example, try with 4 / 5 / 6 characters !
I think you noticed that we named the output file "temporary.txt"
If I named it like that it's because if you look at in, you will have hash:password" and we want "email:password" https://prnt.sc/sve47k So write this command : "hashcat64.exe -a 3 -m 0 hashes.txt ?a?a?a?a?a?a?a?a --show --username --outfile-format 2 --outfile combolist.txt"
(modify the number of "?a" do not change your result) https://prnt.sc/sve4pt
And there you go ! You have your decrypted combolist !!
Your email:pass combo is in combolist.txt
https://prnt.sc/sve5ir
PLEASE READ THIS !!!!
In your command, you can see "-m 0" each time, this correspond to the hash type (here md5)
If you want to change it, type "hashcat64.exe --help" and search your hash number
Finnaly, replace "-m 0" by "-m yournumber"
Tutorial by me ^^ | It took me 3 hours to write this
so please do not repost !
Required files
Hashcat :https://hashcat.net/hashcat/
Combolist :https://ghostbin.co/paste/v2ofw
Password list :
You must upgrade your account or reply in the thread to view hidden text.
Preparation
1. Open your hashcat file https://prnt.sc/svdu8i 2. Put your combolist (use mine for the example) and name it "hashes.txt" https://prnt.sc/svdutk 3. Put your password list and name it "rockyou.txt" https://prnt.sc/svdv8a 4. Copy the repertory https://prnt.sc/svdwaf 5. Open cmd https://prnt.sc/svdxlz 6. Open the repertory in cmd with "cd "repertory"" https://prnt.sc/svdz9h If your repertory is not in C: write the name of your Hard disk :"d:" / "f:" / "j:"before !
Decrypt your combo
We will start by decrypting with our password list (do this step in first !!! this is the quickest way !!) :
First of all, please analayze your hash type, you can do that on internet :
Loading…
www.tunnelsup.com
Loading…
md5decrypt.net
Loading…
www.onlinehashcrack.com
If your hash is md5, you can continue, if it's something else, read the third . https://prnt.sc/sve039
Write the command "hashcat64.exe -a 0 -m 0 hashes.txt rockyou.txt --username --outfile temporary.txt" https://prnt.sc/sve0ty
Then, we will bruteforce last hashes (no worry this do not take so much time)
The command is "hashcat64.exe -a 3 -m 0 hashes.txt ?a?a?a?a --username --outfile temporary.txt" https://prnt.sc/sve29i
In order to decrypt all your hashes, add one "?a" when you want to add one character to your bruteforce :
"?a?a?a?a" will decrypt only passwords with 4 letters/numbers
"?a?a?a?a?a?a" will decrypt only passwords with 6 letters/numbers"
(more there is charachter, more it will take you time"
So if you want to find all hashes with my example, try with 4 / 5 / 6 characters !
I think you noticed that we named the output file "temporary.txt"
If I named it like that it's because if you look at in, you will have hash:password" and we want "email:password" https://prnt.sc/sve47k So write this command : "hashcat64.exe -a 3 -m 0 hashes.txt ?a?a?a?a?a?a?a?a --show --username --outfile-format 2 --outfile combolist.txt"
(modify the number of "?a" do not change your result) https://prnt.sc/sve4pt
And there you go ! You have your decrypted combolist !!
Your email:pass combo is in combolist.txt
https://prnt.sc/sve5ir
PLEASE READ THIS !!!!
In your command, you can see "-m 0" each time, this correspond to the hash type (here md5)
If you want to change it, type "hashcat64.exe --help" and search your hash number
Finnaly, replace "-m 0" by "-m yournumber"