{"id":582,"date":"2022-07-26T06:32:40","date_gmt":"2022-07-26T04:32:40","guid":{"rendered":"https:\/\/infosecscout.com\/?p=582"},"modified":"2023-11-22T13:00:08","modified_gmt":"2023-11-22T12:00:08","slug":"use-mask-attack-with-hashcat","status":"publish","type":"post","link":"https:\/\/infosecscout.com\/use-mask-attack-with-hashcat\/","title":{"rendered":"How To Use Mask Attack With Hashcat – A complete guide"},"content":{"rendered":"\n

Hashcat is a free and fast password cracker available on any platform (Linux, Windows, macOS). I talk a lot about this tool on this website, and today we’ll focus on one of the most popular feature you can use with Hashcat: the mask attack. <\/p>\n\n\n\n

Hashcat can use several attacks. Mask attacks is the number 3 (-a 3) and should be followed with the key space of the password you are looking to crack (ex: ?l?l?l for a three characters password in lowercase). The full command looks like: hashcat <hashes> -m 0 -a 3 <key space><\/em>.<\/strong><\/p>\n\n\n\n

Don’t worry if you are new to this vocabulary, I’ll explain everything in this article. Just make sure you have Hashcat installed on your computer<\/a>, and read the following to know everything about mask attacks with Hashcat.<\/p>\n\n\n\n

\n
\n

Table of Contents<\/p>\nToggle<\/span><\/path><\/svg><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n