From 6f525fab9da8cca14790f211ca09624e8f1d5501 Mon Sep 17 00:00:00 2001 From: Justin Bollinger Date: Fri, 26 Jan 2018 13:16:45 -0500 Subject: [PATCH] Update readme.md --- readme.md | 32 ++++++++++++++++---------------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/readme.md b/readme.md index 301e6b3..a616bf4 100644 --- a/readme.md +++ b/readme.md @@ -72,50 +72,50 @@ $ ./hate_crack.py 1000 Select a task: ``` ------------------------------------------------- -####Quick Crack +#### Quick Crack * Runs a dictionary attack using all wordlists configured in your "hcatOptimizedWordlists" path and applies the "best64.rule", with the option of chaining the "best64.rule". ####Extensive Pure_Hate Methodology Crack * Runs several attack methods provided by Martin Bos (formerly known as pure_hate) -####Brute Force Attack (7 characters) -####Dictionary Attack +#### Brute Force Attack (7 characters) +#### Dictionary Attack * All wordlists in "hcatOptimizedWordlists" with "best64.rule" * wordlists/rockyou.txt with "d3ad0ne.rule" * wordlists/rockyou.txt with "T0XlC.rule" -####Top Mask Attack (Target Time = 4 Hours) -####Fingerprint Attack -####Combinator Attack -####Hybrid Attack +#### Top Mask Attack (Target Time = 4 Hours) +#### Fingerprint Attack +#### Combinator Attack +#### Hybrid Attack Extra - Just For Good Measure ------------------------------------------------- Runs a dictionary attack using wordlists/rockyou.txt with chained "combinator.rule" and "InsidePro-PasswordsPro.rule" rules ------------------------------------------------- -####Brute Force Attack +#### Brute Force Attack Brute forces all characters with the choice of a minimum and maximum password length. ------------------------------------------------- -####Top Mask Attack +#### Top Mask Attack Runs a top mask attack using passwords already cracked for the current session. Presents the user a choice of target cracking time to spend (default 4 hours). ------------------------------------------------- -####Fingerprint Attack +#### Fingerprint Attack https://hashcat.net/wiki/doku.php?id=fingerprint_attack Runs a fingerprint attack using passwords already cracked for the current session. ------------------------------------------------- -####Combinator Attack +#### Combinator Attack https://hashcat.net/wiki/doku.php?id=combinator_attack Runs a combinator attack using the "rockyou.txt" wordlist. ------------------------------------------------- -####Hybrid Attack +#### Hybrid Attack https://hashcat.net/wiki/doku.php?id=hybrid_attack * Runs several hybrid attacks using the "rockyou.txt" wordlists. @@ -126,7 +126,7 @@ https://hashcat.net/wiki/doku.php?id=hybrid_attack - Hybrid Mask + Wordlist - ?s?d ?1?1?1 wordlists/rockyou.txt - Hybrid Mask + Wordlist - ?s?d ?1?1?1?1 wordlists/rockyou.txt ------------------------------------------------- -####Pathwell Top 100 Mask Brute Force Crack +#### Pathwell Top 100 Mask Brute Force Crack Runs a brute force attack using the top 100 masks from KoreLogic: https://blog.korelogic.com/blog/2014/04/04/pathwell_topologies @@ -138,13 +138,13 @@ https://hashcat.net/events/p14-trondheim/prince-attack.pdf Runs a PRINCE attack using wordlists/rockyou.txt ------------------------------------------------- -####YOLO Combinator Attack +#### YOLO Combinator Attack Runs a continuous combinator attack using random wordlists from the optimized wordlists for the left and right sides. ------------------------------------------------- -####Add-on Tools +#### Add-on Tools wordlist_optimizer.py - parses all wordlists from ``, sorts them by length and de-duplicates into `` @@ -154,7 +154,7 @@ usage: python wordlist_optimizer.py $ python wordlist_optimizer.py wordlists.txt ../optimized_wordlists ``` -###Version History +### Version History Version 1.00 Initial public release