usage:

hashcat -m 0 -a 0 hash.txt /usr/share/seclists/Passwords/Common-Credentials/100k-most-used-passwords-NCSC.txt
  • -m sets the hash mode. 0 here is MD5 in this case
  • -a sets the attack mode
    • 0 is straight mode. uses a wordlist
    • 1 is combination mode. uses two wordlists
    • 2 is brute force. uses masks
    • 3 is a hybrid of straight and bruteforce. uses masks AND wordlists.
  • hash.txt is the file storing the hashes. can be the hash itself as well
  • /usr/share/wordlists/rockyou.txt is the wordlist you wanna use
  • -D selects the device to do the hash cracking with. a gpu is preferred
    • do -I to check devices and select the device in the command like -D 1