# Detect the hash format of the given file 'hashes.txt'
hashid -m hashes.txt
# Crack NTLM hashes (mode 13100) using the specified hash list and password list, applying a rule set
./hashcat.exe -a 0 -m 13100 hashes.txt passwords.txt -r 1_rules_full.rule -w 3
# Automatically detect hash format and crack using the specified password list and rule set
./hashcat.exe -a 0 hashes.txt passwords.txt -r 1_rules_full.rule
# Crack Linux hashes using a predefined mode for NTLM hashes (1000)
hashcat -m 1000 -a 3 hash.txt
# Crack NTLM hashes using the 'hashdumpad' method and output to a specified password file
hashcat -m 1000 hashdumpad /home/kali/Downloads/Passwords.txt
# Crack Kerberos hashes and save the results to 'results.txt', using a specific wordlist
hashcat -m 13100 kerberoshash -a 0 -o results.txt /usr/share/wordlists/Active-Directory-Wordlists/Pass.txt
# Crack account hashes for ASP REP Roasting, ensuring to add "23$" after the relevant hash format
hashcat -m 18200 hash.txt Pass.txt
# Change directory to the local Hashcat folder
cd ~/.hashcat
# Change directory to Hashcat's local share folder
cd ~/.local/share/hashcat
# View the cracked passwords alongside the original hashes using the Hashcat potfile
hashcat -m 13100 --force -a 0 hash.txt wordlist.txt --show
# Crack NTLM hashes using John the Ripper with the specified format
john --format=nt hash.txt