The "tartget hash", the "hash type" and optionally the "session name" are entered in this area. With the Help button you can call up a list of the individual "hash types". Please note that with some hash extraction the file name is also extracted into the Hash.txt. If this is the case, you have to delete the file name from the Hash.txt manually.
In this area you can select any word list. You can also select so-called "Rules".
Please note that each rule increases the passwords to be checked exorbitantly. This can lead to a "stack overflow".
Here you can insert masks and various charsets. If you suspect that the target hash could also contain umlauts, you can load the German umlauts in the charset with the "German.hcchr" file, for example. You can also use the "increment mode" to limit the length of the password to be checked.
Combinator attacks can combine two word lists. For example, the password Test0815 can be cracked if the word "Test" was in the first wordlist and the numbers "0815" were in the second. "Rules" can also be specified. You can see the different rules under the following link: click.
Hybrid attacks combine a wordlist with a mask file or vice versa.
A fully automatic "crack routine" is carried out during the automatic attack.
The routine automatically adapts to the hash type speed.
Next to each "start button" in the individual attack modes is a small "screen button". If this button is clicked, the currently generated attack strategy is copied to the "Batch" tab. There individual attack strategies can be collected and then executed together.
The cracked hashes are saved in the "#_Crackout" folder.
In this area you can select and save the basic settings for the respective attacks.
Here you can set that only the CPU is used for cracking.
Here you can set how often the status display is updated. The default value here is 60 seconds.
You should only change this setting if you know what you are doing. Improper use of this function can cause problems and damage.
All decrypted passwords are basically written in the .potfile file under Hashcat. Since Hashbull saves every decrypted password in the "#_Crackout" folder, this function is switched off by default.
Here you have four settings to choose from. From "1 - Slow" to "4- Race". Please note that with "Race" the PC resources are almost completely used up for "cracking", so that other programs will sometimes not run smoothly at this time.
The standard value here is 90 degrees Celsius. As soon as a GPU has reached this value, the running Hashcat process is terminated in order to avoid hardware damage to the GPU.
Here you can select which GPUs should be used for the Hashcat process. The devices are specified with numbers and separated by commas. Should you e.g. If you have installed 4 GPUs and only want to use three for the process, you have to enter "2,3,4". The number 1 is basically reserved for the CPU.
Here you can enter all Hashcat parameters manually. A full list can be found here.
The "-O" command is preset. This optimizes the kernels and this entry speeds up the Hashcat process enormously. The disadvantage is that in this mode only passwords up to a length of 16 characters can be cracked.