runHashcat
Crack password hashes using multiple attack modes such as brute-force, dictionary, or hybrid techniques. Supports various hash types, wordlists, masks, and incremental modes for efficient password recovery.
Input Schema
Name | Required | Description | Default |
---|---|---|---|
attackMode | No | Attack mode: 0=Straight, 1=Combination, 3=Brute-force, 6=Hybrid Wordlist + Mask, 7=Hybrid Mask + Wordlist | |
customCharset1 | No | User-defined charset ?1 | |
customCharset2 | No | User-defined charset ?2 | |
customCharset3 | No | User-defined charset ?3 | |
customCharset4 | No | User-defined charset ?4 | |
deviceTypes | No | Device types: 1=CPU, 2=GPU, 3=FPGA | |
force | No | Ignore warnings | |
hashData | Yes | String containing the password hashes, one per line. | |
hashType | No | Hash-type, e.g., 0=MD5, 100=SHA1, 1000=NTLM, 1400=SHA2-256, 1800=sha512crypt, 22000=WPA*01/WPA*02 | |
increment | No | Enable incremental mode (start with shorter passwords) | |
incrementMax | No | Maximum password length for incremental mode | |
incrementMin | No | Minimum password length for incremental mode | |
loopback | No | Add new plains to induct directory | |
markovThreshold | No | Threshold X when to stop accepting new Markov-chains | |
mask | No | Mask for brute-force attacks (e.g., '?a?a?a?a?a?a?a?a' for 8 chars) | |
optimizedKernels | No | Enable optimized kernels (-O) | |
options | No | Additional raw hashcat options | |
outfile | No | Output file for cracked hashes | |
outfileFormat | No | Output format: 1=hash, 2=plain, 3=hex-plain, etc. | |
potfilePath | No | Path to custom potfile | |
quiet | No | Suppress output | |
restore | No | Restore a previous session | |
rules | No | Rules file to apply to wordlist | |
runtime | No | Abort session after X seconds | |
session | No | Session name for resuming attacks | |
showProgress | No | Show progress every X seconds | |
wordlist | No | Path to wordlist file for dictionary attacks | |
workloadProfile | No | Workload profile: 1=Low, 2=Default, 3=High, 4=Nightmare |
Input Schema (JSON Schema)
{
"$schema": "http://json-schema.org/draft-07/schema#",
"additionalProperties": false,
"properties": {
"attackMode": {
"description": "Attack mode: 0=Straight, 1=Combination, 3=Brute-force, 6=Hybrid Wordlist + Mask, 7=Hybrid Mask + Wordlist",
"enum": [
"0",
"1",
"3",
"6",
"7"
],
"type": "string"
},
"customCharset1": {
"description": "User-defined charset ?1",
"type": "string"
},
"customCharset2": {
"description": "User-defined charset ?2",
"type": "string"
},
"customCharset3": {
"description": "User-defined charset ?3",
"type": "string"
},
"customCharset4": {
"description": "User-defined charset ?4",
"type": "string"
},
"deviceTypes": {
"description": "Device types: 1=CPU, 2=GPU, 3=FPGA",
"items": {
"enum": [
"1",
"2",
"3"
],
"type": "string"
},
"type": "array"
},
"force": {
"description": "Ignore warnings",
"type": "boolean"
},
"hashData": {
"description": "String containing the password hashes, one per line.",
"type": "string"
},
"hashType": {
"description": "Hash-type, e.g., 0=MD5, 100=SHA1, 1000=NTLM, 1400=SHA2-256, 1800=sha512crypt, 22000=WPA*01/WPA*02",
"type": "string"
},
"increment": {
"description": "Enable incremental mode (start with shorter passwords)",
"type": "boolean"
},
"incrementMax": {
"description": "Maximum password length for incremental mode",
"type": "integer"
},
"incrementMin": {
"description": "Minimum password length for incremental mode",
"type": "integer"
},
"loopback": {
"description": "Add new plains to induct directory",
"type": "boolean"
},
"markovThreshold": {
"description": "Threshold X when to stop accepting new Markov-chains",
"type": "integer"
},
"mask": {
"description": "Mask for brute-force attacks (e.g., '?a?a?a?a?a?a?a?a' for 8 chars)",
"type": "string"
},
"optimizedKernels": {
"description": "Enable optimized kernels (-O)",
"type": "boolean"
},
"options": {
"description": "Additional raw hashcat options",
"items": {
"type": "string"
},
"type": "array"
},
"outfile": {
"description": "Output file for cracked hashes",
"type": "string"
},
"outfileFormat": {
"description": "Output format: 1=hash, 2=plain, 3=hex-plain, etc.",
"type": "integer"
},
"potfilePath": {
"description": "Path to custom potfile",
"type": "string"
},
"quiet": {
"description": "Suppress output",
"type": "boolean"
},
"restore": {
"description": "Restore a previous session",
"type": "boolean"
},
"rules": {
"description": "Rules file to apply to wordlist",
"type": "string"
},
"runtime": {
"description": "Abort session after X seconds",
"type": "integer"
},
"session": {
"description": "Session name for resuming attacks",
"type": "string"
},
"showProgress": {
"description": "Show progress every X seconds",
"type": "boolean"
},
"wordlist": {
"description": "Path to wordlist file for dictionary attacks",
"type": "string"
},
"workloadProfile": {
"description": "Workload profile: 1=Low, 2=Default, 3=High, 4=Nightmare",
"enum": [
"1",
"2",
"3",
"4"
],
"type": "string"
}
},
"required": [
"hashData"
],
"type": "object"
}