Hashcat, John the Ripper, Hydra, Medusa, CrackMapExec — Password Cracking এবং Aircrack-ng, Airmon-ng, Airodump-ng, Aireplay-ng — WiFi Hacking-এর সম্পূর্ণ command reference। Hashcat, John the Ripper, Hydra, Medusa, CrackMapExec — Password Cracking and Aircrack-ng Suite — complete WiFi Hacking command reference.
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| -m [type] | Hash type specify করো (নিচে দেখো)Specify hash type (see below) | -m 0 (MD5), -m 1000 (NTLM) |
| -a [mode] | Attack mode specify করো (নিচে দেখো)Specify attack mode (see below) | -a 0 (wordlist), -a 3 (brute) |
| -o file.txt | Cracked password output file-এ save করোSave cracked passwords to file | -o cracked.txt |
| --show | আগে crack হওয়া result দেখাওShow previously cracked results | hashcat -m 0 hashes.txt --show |
| --force | Warning ignore করে force চালাওForce run ignoring warnings | --force |
| -r rule.rule | Rule file apply করোApply rule file | -r /usr/share/hashcat/rules/best64.rule |
| --username | user:hash format-এর file handle করোHandle user:hash format files | --username |
| -w [1-4] | Workload profile (1=low, 4=nightmare)Workload profile (1=low, 4=nightmare) | -w 3 |
| --status | Cracking status দেখাও (real-time)Show cracking status in real-time | --status |
| --restore | আগে বন্ধ করা session restore করোRestore previously stopped session | hashcat --restore |
| --session name | Session-এর নাম দাও (resume করার জন্য)Name the session (for later resume) | --session mysession |
| --increment | Mask length আস্তে আস্তে বাড়াওIncrementally increase mask length | --increment --increment-min=4 |
| -D 1,2 | Device type select করো (1=CPU, 2=GPU)Select device type (1=CPU, 2=GPU) | -D 2 |
| --benchmark | GPU/CPU speed benchmark দেখাওShow GPU/CPU speed benchmark | hashcat --benchmark |
| Mode | নামName | বিবরণDescription | উদাহরণExample |
|---|---|---|---|
| -a 0 | WordlistWordlist | Dictionary থেকে একে একে try করোTry each word from dictionary | hashcat -m 0 -a 0 hash.txt rockyou.txt |
| -a 1 | CombinationCombination | দুটো wordlist combine করোCombine two wordlists | hashcat -m 0 -a 1 hash.txt w1.txt w2.txt |
| -a 3 | Brute Force / MaskBrute Force / Mask | Mask pattern দিয়ে সব combination tryTry all combinations using mask pattern | hashcat -m 0 -a 3 hash.txt ?a?a?a?a |
| -a 6 | Wordlist + MaskWordlist + Mask | Wordlist-এর পরে mask যোগ করোAppend mask after each word | hashcat -m 0 -a 6 hash.txt words.txt ?d?d |
| -a 7 | Mask + WordlistMask + Wordlist | Mask-এর পরে wordlist যোগ করোPrepend mask before each word | hashcat -m 0 -a 7 hash.txt ?d?d words.txt |
| Character | মানেMeaning |
|---|---|
?l | lowercase a-z |
?u | uppercase A-Z |
?d | digits 0-9 |
?s | special characters (!@#$...) |
?a | ?l + ?u + ?d + ?s (সব) |
?b | 0x00 - 0xff (binary) |
| -m value | Hash Type | উদাহরণ hashExample hash | ব্যবহারUsed in |
|---|---|---|---|
| 0 | MD5 | 5f4dcc3b5aa765d61d8327deb882cf99 | Web apps, old systems |
| 100 | SHA1 | 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 | Git, old systems |
| 1400 | SHA256 | 5e884898da2847151d0e56f8dc6292... | Linux /etc/shadow |
| 1700 | SHA512 | b109f3bbbc244eb82441917ed06d618... | Modern Linux |
| 1000 | NTLM | 8846f7eaee8fb117ad06bdd830b7586c | Windows SAM/AD |
| 3000 | LM | 299bd128c1101fd6 | Old Windows (XP) |
| 5600 | NetNTLMv2 | admin::N46iSNekpT:... | Responder capture |
| 3200 | bcrypt | $2a$10$N9qo8uLOickgx2ZMRZo... | Modern web apps |
| 500 | md5crypt | $1$salt$hash | Old Linux |
| 1800 | sha512crypt | $6$salt$hash | Modern Linux /etc/shadow |
| 2500 | WPA/WPA2 | .hccapx file | WiFi handshake |
| 22000 | WPA-PBKDF2-PMKID+EAPOL | .hc22000 file | Modern WiFi crack |
| 13100 | Kerberoast | $krb5tgs$23$*user$... | Active Directory |
| 18200 | AS-REP Roast | $krb5asrep$23$... | Active Directory |
| 400 | WordPress (phpass) | $P$B... | WordPress |
| 1500 | DES (Unix) | rEK1ecacw.7.c | Very old Unix |
| Flag / Command | কাজFunction | উদাহরণExample |
|---|---|---|
| john hash.txt | Default mode-এ crack করো (format auto-detect)Crack in default mode (auto-detect format) | john hashes.txt |
| --wordlist=file | Wordlist দিয়ে crack করোCrack using wordlist | --wordlist=/usr/share/wordlists/rockyou.txt |
| --format=type | Hash format manually specify করোManually specify hash format | --format=NT, --format=md5crypt |
| --rules | Default rules apply করো (wordlist মোড)Apply default rules (in wordlist mode) | john hash.txt --wordlist=rk.txt --rules |
| --rules=Jumbo | Jumbo rules apply করো (বেশি variation)Apply Jumbo rules (more variations) | --rules=Jumbo |
| --incremental | Incremental mode — সব combination try করোIncremental mode — try all combinations | john hash.txt --incremental |
| --incremental=Digits | শুধু digit combination try করোTry only digit combinations | --incremental=Digits |
| --show | Cracked password দেখাওShow cracked passwords | john hash.txt --show |
| --pot=file | Custom pot file ব্যবহার করোUse custom pot file | --pot=my.pot |
| --list=formats | সব supported format দেখাওList all supported formats | john --list=formats |
| --fork=N | N টি process parallel চালাওRun N processes in parallel | --fork=4 |
| --session=name | Session নাম দাও (resume করার জন্য)Name session for resuming later | --session=crack1 |
| --restore=name | বন্ধ করা session resume করোResume a stopped session | --restore=crack1 |
| --status | Current cracking status দেখাওShow current cracking status | john --status |
*2john script আছে যেগুলো বিভিন্ন file থেকে hash extract করে John-এর জন্য ready করে। Kali-তে /usr/share/john/ এ পাবে।
John includes many *2john scripts that extract hashes from various files to prepare them for John. Find them at /usr/share/john/ in Kali.
| File Type | Hash Extract Command | Crack Command |
|---|---|---|
| ZIP | zip2john secret.zip > zip.hash | john zip.hash --wordlist=rockyou.txt |
| RAR | rar2john secret.rar > rar.hash | john rar.hash --wordlist=rockyou.txt |
| SSH Key | ssh2john id_rsa > ssh.hash | john ssh.hash --wordlist=rockyou.txt |
| pdf2john doc.pdf > pdf.hash | john pdf.hash --wordlist=rockyou.txt | |
| Linux Shadow | unshadow /etc/passwd /etc/shadow > unshadowed.txt | john unshadowed.txt --wordlist=rockyou.txt |
| KeePass | keepass2john database.kdbx > kp.hash | john kp.hash --wordlist=rockyou.txt |
| 7z | 7z2john archive.7z > 7z.hash | john 7z.hash --wordlist=rockyou.txt |
| Office | office2john doc.docx > office.hash | john office.hash --wordlist=rockyou.txt |
| Wifi | hccap2john capture.hccapx > wpa.hash | john wpa.hash --wordlist=rockyou.txt |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| -l username | Single username specify করোSpecify single username | -l admin |
| -L userlist.txt | Username list file দাওProvide username list file | -L users.txt |
| -p password | Single password specify করোSpecify single password | -p password123 |
| -P passlist.txt | Password list file দাওProvide password list file | -P /usr/share/wordlists/rockyou.txt |
| -C combo.txt | user:pass combination file দাওProvide user:pass combination file | -C credentials.txt |
| -t threads | Parallel thread count (default: 16)Number of parallel threads (default: 16) | -t 32 |
| -s port | Custom port specify করোSpecify custom port | -s 2222 |
| -v | Verbose mode — প্রতিটি attempt দেখাওVerbose — show each attempt | -v |
| -V | Extra verbose — login+password দেখাওExtra verbose — show login+password | -V |
| -d | Debug modeDebug mode | -d |
| -o file | Found credentials file-এ save করোSave found credentials to file | -o found.txt |
| -e nsr | n=null, s=same as login, r=reversed login try করোTry n=null, s=same as login, r=reversed login | -e nsr |
| -W seconds | Request-এর মধ্যে wait time (rate limit bypass)Wait time between requests (rate limit bypass) | -W 3 |
| -x min:max:charset | Password generation করো (brute force mode)Generate passwords (brute force mode) | -x 4:8:a |
| -R | বন্ধ করা session resume করোResume a stopped session | -R |
| -S | SSL connection ব্যবহার করোUse SSL connection | -S |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| -h host | Target host specify করোSpecify target host | -h 192.168.1.5 |
| -H hosts.txt | Multiple hosts file দাওProvide multiple hosts file | -H hosts.txt |
| -u username | Single usernameSingle username | -u admin |
| -U users.txt | Username list fileUsername list file | -U users.txt |
| -p password | Single passwordSingle password | -p password123 |
| -P passlist.txt | Password list filePassword list file | -P rockyou.txt |
| -M module | Protocol module specify করোSpecify protocol module | -M ssh, -M ftp, -M http |
| -n port | Custom portCustom port | -n 2222 |
| -t threads | Threads per hostThreads per host | -t 4 |
| -T hosts | Parallel host countNumber of parallel hosts | -T 10 |
| -O file | Output file-এ save করোSave output to file | -O medusa_out.txt |
| -v level | Verbose level (0-6)Verbose level (0-6) | -v 6 |
| কমান্ডCommand | কাজFunction |
|---|---|
| cme smb 192.168.1.0/24 | Subnet-এ সব SMB host discover করোDiscover all SMB hosts on subnet |
| cme smb target -u user -p pass | Single credential দিয়ে login test করোTest login with single credential |
| cme smb target -u users.txt -p pass | User list দিয়ে password spray করোPassword spray with user list |
| cme smb target -u user -p pass --shares | SMB shares enumerate করোEnumerate SMB shares |
| cme smb target -u user -p pass --sam | SAM database dump করোDump SAM database |
| cme smb target -u user -p pass --lsa | LSA secrets dump করোDump LSA secrets |
| cme smb target -u user -p pass -x "whoami" | Remote command execute করো (cmd)Execute remote command (cmd) |
| cme smb target -u user -p pass -X "Get-Process" | PowerShell command execute করোExecute PowerShell command |
| cme smb target -u user -H hash | Pass-the-Hash attack করোPerform Pass-the-Hash attack |
| cme smb target -u user -p pass --users | Domain users enumerate করোEnumerate domain users |
| cme smb target -u user -p pass --groups | Domain groups enumerate করোEnumerate domain groups |
| cme winrm target -u user -p pass | WinRM login test করোTest WinRM login |
| cme ssh target -u user -p pass | SSH login test করোTest SSH login |
| cme ldap target -u user -p pass | LDAP query করো (AD)Query LDAP (Active Directory) |
WiFi Hacking Workflow: Step 1: airmon-ng start wlan0 → Monitor mode চালু ↓ Step 2: airodump-ng wlan0mon → Networks scan করো ↓ Step 3: airodump-ng -c [CH] --bssid [MAC] -w capture wlan0mon → Handshake capture ↓ Step 4: aireplay-ng --deauth 10 -a [BSSID] wlan0mon → Client disconnect করো ↓ Step 5: WPA handshake captured! (capture.cap file) ↓ Step 6: aircrack-ng -w rockyou.txt capture.cap → Password crack করো
| কমান্ডCommand | কাজFunction |
|---|---|
| airmon-ng | Available wireless interfaces দেখাওShow available wireless interfaces |
| airmon-ng check | Interfering processes দেখাওShow interfering processes |
| airmon-ng check kill | Interfering processes kill করো (NetworkManager ইত্যাদি)Kill interfering processes (NetworkManager etc.) |
| airmon-ng start wlan0 | wlan0-তে monitor mode চালু করো → wlan0mon তৈরি হবেEnable monitor mode on wlan0 → creates wlan0mon |
| airmon-ng start wlan0 6 | নির্দিষ্ট channel-এ monitor mode চালু করোEnable monitor mode on specific channel |
| airmon-ng stop wlan0mon | Monitor mode বন্ধ করোDisable monitor mode |
| iwconfig | Interface mode verify করো (Mode:Monitor দেখাবে)Verify interface mode (shows Mode:Monitor) |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| airodump-ng wlan0mon | সব nearby networks দেখাও (scan)Show all nearby networks (scan) | airodump-ng wlan0mon |
| -c channel | নির্দিষ্ট channel lock করোLock to a specific channel | -c 6 |
| --bssid MAC | Target AP-এর MAC address specify করোSpecify target AP MAC address | --bssid AA:BB:CC:DD:EE:FF |
| -w filename | Capture file-এ save করোSave capture to file | -w capture |
| --output-format | Output format specify করো (pcap, csv, kismet)Specify output format | --output-format pcap |
| --band abg | Band specify করো (2.4GHz=bg, 5GHz=a)Specify band (2.4GHz=bg, 5GHz=a) | --band abg |
| --wps | WPS-enabled networks দেখাওShow WPS-enabled networks | --wps |
| --encrypt WPA | শুধু WPA networks filter করোFilter only WPA networks | --encrypt WPA |
| Flag / Attack | কাজFunction | উদাহরণExample |
|---|---|---|
| --deauth N -a BSSID | AP-এর সব client-কে N packets deauth করোDeauth all clients from AP with N packets | --deauth 10 -a AA:BB:CC:DD:EE:FF |
| --deauth N -a BSSID -c CLIENT | নির্দিষ্ট client-কে deauth করোDeauth a specific client | --deauth 10 -a AP_MAC -c CLIENT_MAC |
| --deauth 0 | Continuous deauth (0 = infinite)Continuous deauth (0 = infinite) | --deauth 0 -a BSSID |
| --fakeauth 0 -a BSSID | Fake authentication (WEP attack)Fake authentication (WEP attack) | --fakeauth 0 -a BSSID -h OWN_MAC |
| --arpreplay -b BSSID | ARP replay attack (WEP attack)ARP replay attack (WEP crack) | --arpreplay -b BSSID -h MAC |
| --test | Injection test করোTest packet injection | aireplay-ng --test wlan0mon |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| aircrack-ng capture.cap | Capture file analyze করো (handshake আছে কিনা)Analyze capture file (check for handshake) | aircrack-ng capture-01.cap |
| -w wordlist.txt | Wordlist দিয়ে crack করোCrack using wordlist | -w /usr/share/wordlists/rockyou.txt |
| -b BSSID | নির্দিষ্ট AP target করোTarget a specific AP | -b AA:BB:CC:DD:EE:FF |
| -e ESSID | Network name (SSID) specify করোSpecify network name (SSID) | -e "HomeNetwork" |
| -l output.txt | Cracked key file-এ save করোSave cracked key to file | -l cracked_key.txt |
| Hash দেখতে এরকমHash looks like | Type | Hashcat -m |
|---|---|---|
5f4dcc3b5aa765d61d8327deb882cf99 (32 chars) | MD5 | 0 |
5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 (40 chars) | SHA1 | 100 |
5e884898da28... (64 chars) | SHA256 | 1400 |
b109f3bbbc244eb82441917... (128 chars) | SHA512 | 1700 |
8846f7eaee8fb117ad06bdd830b7586c (32 chars, Windows) | NTLM | 1000 |
$1$salt$hash | MD5crypt (Linux) | 500 |
$2a$10$... বা $2y$... | bcrypt | 3200 |
$5$salt$hash | SHA256crypt (Linux) | 7400 |
$6$salt$hash | SHA512crypt (Linux) | 1800 |
$P$B... (WordPress) | phpass | 400 |
admin::N46iSNek:... | NetNTLMv2 | 5600 |
$krb5tgs$23$... | Kerberoast | 13100 |
| Path | Size | ব্যবহারBest for |
|---|---|---|
/usr/share/wordlists/rockyou.txt | 14M passwords | Password cracking (সবচেয়ে popular)Password cracking (most popular) |
/usr/share/wordlists/dirb/common.txt | 4,614 words | Directory brute force (fast) |
/usr/share/wordlists/dirb/big.txt | 20,469 words | Directory brute force (thorough) |
/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt | 220,560 | Web directory (comprehensive) |
/usr/share/seclists/ | Massive | Everything (install: apt install seclists) |
/usr/share/seclists/Passwords/Common-Credentials/10-million-password-list-top-1000.txt | 1000 | Quick password test |
/usr/share/seclists/Discovery/DNS/subdomains-top1million-5000.txt | 5000 | Subdomain brute force |
/usr/share/seclists/Discovery/Web-Content/raft-large-words.txt | 119k | Large web content discovery |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| crunch min max | min থেকে max length পর্যন্ত সব word generateGenerate all words from min to max length | crunch 4 6 |
| crunch min max charset | নির্দিষ্ট character set দিয়ে generateGenerate using specific character set | crunch 4 4 abc123 |
| -o file | File-এ save করোSave to file | -o wordlist.txt |
| -t pattern | Pattern দিয়ে generate (@ lowercase, , uppercase, % digit, ^ special)Generate with pattern (@ lower, , upper, % digit, ^ special) | -t admin@@@ |
| -b size | File size limit per fileLimit output file size | -b 100mb |
| -d count | Duplicate consecutive character limitLimit duplicate consecutive characters | -d 2 |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| cewl http://target.com | Website থেকে unique words collect করোCollect unique words from website | cewl http://target.com |
| -d depth | Crawl depth সেট করো (default: 2)Set crawl depth (default: 2) | -d 3 |
| -m length | Minimum word length সেট করোSet minimum word length | -m 6 |
| -w file | Output file-এ save করোSave output to file | -w cewl_list.txt |
| Email addresses-ও collect করোAlso collect email addresses | ||
| -v | Verbose outputVerbose output | -v |
🔑 "A strong password is your first line of defense — and often the last thing standing between an attacker and your data."
সব কিছু authorized environment-এ practice করো। অন্যের WiFi বা system-এ attack করা সম্পূর্ণ illegal। Practice everything in authorized environments only. Attacking others' WiFi or systems is completely illegal.
Kali Linux Series — Part 4 | v1.0 | Password Attacks & Wireless
Part 5: Post-Exploitation & Forensics (Netcat, LinPEAS, Volatility, Autopsy) →