getbetterat.work
The Fastest Password Tester

Understanding Hashcat

Hashcat is a tool used by computer experts to test if passwords are safe. It guesses passwords extremely fast to see if a system is easy to break into.

Why do we need it?

If you want to know if your house is safe, you hire someone to try and pick the lock. Hashcat is the tool experts use to pick the digital locks on passwords.

Tests security (Auditing)

What is a "Hash"?

Computers do not save your real password. That would be unsafe. Instead, they use a math trick to turn your password into a messy pile of letters and numbers. This messy pile is called a Hash.

1

Your Password

apple123
2

The Hash (Saved)

5f4dcc3b5aa765...

The One-Way Rule

You cannot turn a Hash back into a password. It is a one-way street. The only way to find the password is to guess a word, turn it into a hash, and see if it matches the saved hash. Hashcat is simply a very fast guesser.

How does it know what lock it is?

Before Hashcat can pick a lock, it needs to know what brand the lock is. Different math tricks create hashes of different sizes and shapes.

Experts look at the length of the messy letters to guess the lock type. Once they know the type, they tell Hashcat exactly how to attack it.

Short (32 letters) Usually MD5
Medium (40 letters) Usually SHA-1
Long (64 letters) Usually SHA-256

Making it Harder: Adding "Salt"

If everyone uses the password "apple", the hash will always look exactly the same. To fix this, computers add random extra letters to your password before mixing it. This is called "Salt".

apple
Xy9! (Salt)
Totally New Hash

Salt means Hashcat cannot use shortcuts. It forces Hashcat to do the hard math all over again for every single user.

The Secret Weapon

Why is Hashcat so fast?

Normal Way

The CPU (Brain)

The main brain of your computer is very smart, but it only has a few "hands" to do work. It guesses one password at a time. It is like a smart professor taking a math test.

Hashcat's Way

The GPU (Video Card)

Video cards are used for playing games. They have thousands of tiny "hands". Hashcat uses the video card to guess thousands of passwords at the exact same time. It is like an army of 10,000 workers.

What does a cracking computer look like?

Experts do not use laptops. They build custom machines called "Cracking Rigs". These look like giant, noisy metal boxes.

  • Up to 8 huge video cards in one box.
  • Massive fans because it gets very hot.
  • Uses as much electricity as a small oven.
GPU 1
GPU 2
GPU 3
GPU 4
GPU 5
GPU 6

Teamwork: Connecting Computers

Sometimes, one cracking computer is not enough. Experts connect many computers together over the internet. One "Boss" computer hands out pieces of the dictionary to all the "Worker" computers. They all use Hashcat at the same time to finish the job faster.

Worker 1

The Boss Server

Manages the work

Worker 2

How Hashcat Guesses: Basic Plans

Hashcat does not just guess randomly. It has smart plans, called "Attack Modes", to find the right password.

1. The Dictionary

It tries a massive list of common words. People are lazy and often use simple words.

> password
> 123456
> monkey
> admin

2. Brute Force

It tries every single combination of letters and numbers. This takes a long time, but it never misses.

> aaaa
> aaab
> aaac
> ...

3. Rule Changes

It takes a normal word and adds rules, like making the first letter big, or adding numbers at the end.

Base: apple
> Apple
> apple123
> @pple!

Advanced Plans

4. The Mask Attack

If you know a password starts with "Admin" and ends with exactly 3 numbers, Hashcat won't waste time guessing letters. It only guesses the missing pieces.

Admin ? ? ?

5. Combinator Attack

It takes two different books of words and mashes them together. Useful when people use two simple words as one long password.

List 1
Red
List 2
Car
RedCar

Where do the guesses come from?

Experts do not type the dictionaries themselves.

Over the years, many websites have been hacked. Hackers stole real passwords and put them in giant text files on the internet. Experts use these exact files to test systems.

rockyou.txt

The most famous dictionary file. It contains over 14 million real passwords that people actually used.

Inside rockyou.txt

123456

12345

123456789

password

iloveyou

princess

1234567

rockyou

qwerty

How Rules "Mutate" Words

Hashcat is smart enough to know that people try to be tricky. It uses "Rules files" to change letters automatically. It translates normal words into hacker language (Leetspeak).

password
p@ssw0rd
summer
Summer2024!
hello
h3ll0

The Speed of Hashcat

Billions
Of guesses per second

With a strong computer, Hashcat can make billions of guesses in a single second. This makes it perfect for large, heavy jobs.

The Locks It Can Open

Different systems use different math rules (Algorithms) to make hashes. Hashcat knows how to speak almost all of them.

MD5

An older, very fast lock. It is weak today, and Hashcat can crack these instantly.

SHA-256

A modern, strong lock used by many websites and even Bitcoin.

NTLM

The lock that Microsoft Windows computers use to save user passwords.

WPA2

The lock used on your home Wi-Fi internet connection.

The Math of Time

Why does length matter? Every single letter you add multiplies the time it takes Hashcat to guess. Look at what happens to Hashcat's speed as passwords get longer.

8 Letters

Cracked Instantly

10 Letters

Takes a few Hours

15+ Letters

Takes Millions of Years

Hashcat gives up!
Security Vault

Why Good People Use It

Security Auditing

Companies hire "good hackers" to test their systems. These experts take the list of company hashes and run Hashcat.

If Hashcat can guess an employee's password quickly, it means the password was too weak. The company then tells the employee to change it before a "bad hacker" can do the exact same thing.

What it looks like in action

Terminal - Hashcat
$ hashcat -m 0 -a 0 secret_hashes.txt rockyou.txt

# -m 0 : Tells Hashcat the lock type is MD5.

# -a 0 : Tells Hashcat to use the Dictionary attack mode.

# secret_hashes.txt : The file containing the messy hashes.

# rockyou.txt : The giant book of common passwords to guess.

Status.........: Cracked

How to stop Hashcat

Hashcat is powerful, but it has one big weakness: Time. If you make a password long enough, even the fastest computers would take millions of years to guess it.

Bad Passwords

Short words with simple numbers are cracked in less than a second.

  • dog123
  • Password!
  • admin2023

Good Passwords

Use a "Passphrase". Combine random, long words. Hashcat hates length.

  • > BlueCoffeeJumpingCar
  • > AngryPlanetGuitarTree
  • > 17HappyDogsRunningFast!

The Golden Rule of Security

Only test what you own.

Using Hashcat to break into systems you do not own is illegal and unethical. It is a crime.

Professionals always have a signed paper from a company giving them permission to test the company's passwords. Never use these tools on systems without written permission.

Quick Review

Power
Uses Video Cards (GPUs)
Speed
Billions of guesses a second
Method
Dictionaries & Masks
Purpose
Testing & Auditing