Verify Cracked Hashes
In this final step, you will verify and analyze the results of your brute-force attack. Hashcat automatically stores successfully cracked passwords in a special file called the "potfile". This acts as a database of all passwords you've recovered during your cracking sessions. We'll examine this to confirm which passwords were successfully cracked.
First, let's navigate to our working directory where we stored our hash file. This ensures we're working with the correct files:
cd ~/project
To view all cracked hashes from your attack, we use the --show
flag with Hashcat. This command specifically looks for MD5 hashes (mode 0) in our hashes.txt file and displays any matches found in the potfile:
hashcat -m 0 hashes.txt --show
You should see output similar to this, showing the original hash followed by its cracked plaintext password:
5f4dcc3b5aa765d61d8327deb882cf99:password
098f6bcd4621d373cade4e832627b4f6:test
For a more comprehensive understanding of your cracking session, the --status
flag provides valuable statistics. This shows how many hashes were cracked, the hash type, and performance metrics:
hashcat -m 0 hashes.txt --status
This will display important information including:
Session.Name.....: hashcat
Status..........: Exhausted
Hash.Name.......: MD5
Hash.Target.....: hashes.txt
Time.Started....: [timestamp]
Time.Estimated..: [timestamp]
Recovered.......: 2/2 (100.00%)
Progress.......: [progress]
Speed.#1.......: [speed] H/s
To generate a complete report of your cracking session that you can save and review later, use the following commands. The first creates a formatted report file, and the second displays its contents:
hashcat -m 0 hashes.txt --outfile-format=2 --outfile=results.txt
cat results.txt
The report will contain detailed information about each cracked hash, including the hash type, plaintext password, and the exact time it took to crack each one. This documentation is particularly useful when you need to analyze your cracking performance or share results with others.