Hashcat: GPU Cracking at Scale

Hashcat is the world’s fastest password recovery tool. Designed for brute-force and rule-based attacks, it leverages your GPU to crack passwords faster than any CPU-based tool can dream of. When you need to process massive hash dumps or custom password formats at scale, Hashcat is the go-to weapon.

In this post, we’ll cover how Hashcat works, its core features, and the exact syntax and options you’ll use in the field.

Hashcat is an advanced password cracking tool that supports hundreds of algorithms. It supports brute-force, dictionary, mask, hybrid, and rule-based attacks — all GPU-accelerated. It can be used for anything from cracking NTLM hashes to WPA2 handshakes and bcrypt hashes.

  • GPU-powered cracking (AMD, NVIDIA, Intel)
  • Supports a huge range of hash formats
  • Multiple attack modes (dictionary, brute, hybrid)
  • Highly customizable
  • Resume sessions and benchmarking built-in

On Kali Linux:

apt install hashcat

On other systems, download from:
https://hashcat.net/hashcat/

Verify GPU drivers are properly installed and detected using:

hashcat -I

Hashcat uses numeric codes for hash types. Here are some you’ll often encounter:

ModeHash Type
0MD5
1000NTLM (Windows)
1400SHA-256
1800SHA-512
3200bcrypt
5500NetNTLMv1
5600NetNTLMv2
13100Kerberos 5 TGS-REP
22000WPA/WPA2 (handshakes)

To see all modes:

hashcat -h | grep -A20 'Hash modes'
hashcat -m <mode> -a <attack-mode> <hashfile> <wordlist>
ModeType
0Dictionary
1Combination
3Brute-force (mask)
6Hybrid dict+mask
7Hybrid mask+dict
hashcat -m 1000 -a 0 ntlm_hashes.txt /usr/share/wordlists/rockyou.txt
hashcat -m 0 -a 3 md5hash.txt ?d?d?d?d?d?d
# ?d = digit

First, convert the .pcap to .22000 using hcxpcapngtool:

hcxpcapngtool -o output.22000 capture.pcapng
hashcat -m 22000 -a 0 output.22000 rockyou.txt
hashcat -m 3200 bcrypt.txt rockyou.txt --force

Mask Examples:

?a = all characters
?l = lowercase
?u = uppercase
?d = digits
?s = special chars

Crack a 5-character lowercase password:

hashcat -m 0 -a 3 md5.txt ?l?l?l?l?l
hashcat -b
hashcat --restore
hashcat -m 1000 -a 0 -o cracked.txt --session ntlm-crack hashes.txt rockyou.txt
hashcat --restore --session ntlm-crack

Rules mutate your wordlist to increase success rates.

hashcat -m 1000 -a 0 hashes.txt rockyou.txt -r rules/best64.rule

Rule files are located in the rules/ directory in Hashcat’s install folder.

View cracked hashes:

hashcat -m 1000 --show hashes.txt

Save cracked passwords to a file:

-o found.txt
  • Filter large hash dumps with sort | uniq before cracking
  • Always identify the correct hash type before attacking
  • Use --status to monitor cracking progress live
  • For slow hash types (bcrypt, scrypt), brute force is usually not practical — use targeted wordlists
  • Use hashid or hash-identifier to detect unknown hash formats
FeatureHashcatJohn the Ripper
GPU SupportNative + optimizedPartial (jumbo only)
Mask AttacksFull supportLimited
Rules + WordlistPowerful comboStrong, but slower
CracksFast, high-volumeSmarter, format-rich

Use Hashcat when speed and scale matter. It’s the hammer for large corp hash dumps or WPA2 cracking.

Hashcat is the final boss of password cracking. When you’ve got the hashes and the hardware, this is the tool to reach for. Whether you’re targeting a handful of NTLM hashes or brute-forcing a handshake, Hashcat turns raw computing power into real pentest results.

Scroll to Top