How to Install and Uninstall hashcat Package on Ubuntu 20.10 (Groovy Gorilla)

Last updated: December 23,2024

1. Install "hashcat" package

Please follow the steps below to install hashcat on Ubuntu 20.10 (Groovy Gorilla)

$ sudo apt update $ sudo apt install hashcat

2. Uninstall "hashcat" package

This is a short guide on how to uninstall hashcat on Ubuntu 20.10 (Groovy Gorilla):

$ sudo apt remove hashcat $ sudo apt autoclean && sudo apt autoremove

3. Information about the hashcat package on Ubuntu 20.10 (Groovy Gorilla)

Package: hashcat
Architecture: amd64
Version: 6.1.1+ds1-1
Priority: optional
Section: universe/net
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Security Tools
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 29776
Depends: hashcat-data (>= 6.1.1+ds1-1), pocl-opencl-icd | opencl-icd, libc6 (>= 2.29), libminizip1 (>= 1.1), libxxhash0 (>= 0.6.5), zlib1g (>= 1:1.2.11)
Suggests: beignet-opencl-icd, nvidia-opencl-icd, mesa-opencl-icd
Filename: pool/universe/h/hashcat/hashcat_6.1.1+ds1-1_amd64.deb
Size: 1273196
MD5sum: 4ca5e486297ea47450ef53b630799a9c
SHA1: 1706f5fdcbfa0b55bf85b678fac672d445eb562a
SHA256: 1f2aa3b06db810de50a15713b074c2c6169ce0a59b2e237ac324aa14e3f87bdd
SHA512: 9351c81356c48b402fc26b71ae87fea61ecd7954b6f5c8e5c6d8658cd07327fc7b5c352be7e860b495d6a771fafdd7dfb06aba91919dfd2e175e43e14b933410
Homepage: https://hashcat.net/hashcat/
Description-en: World's fastest and most advanced password recovery utility
Hashcat supports five unique modes of attack for over 300 highly-optimized
hashing algorithms. hashcat currently supports CPUs, GPUs, and other
hardware accelerators on Linux, and has facilities to help enable
distributed password cracking.
.
Examples of hashcat supported hashing algorithms are:
MD5, HMAC-MD5, SHA1, HMAC-SHA1, MySQL323, MySQL4.1/MySQL5, phpass,
MD5(Wordpress), MD5(phpBB3), MD5(Joomla), md5crypt, MD5(Unix),
FreeBSD MD5, Cisco-IOS, MD4, NTLM, Domain Cached Credentials (DCC),
MS Cache, SHA256, HMAC-SHA256, md5apr1, MD5(APR), Apache MD5, SHA512,
HMAC-SHA512, Cisco-PIX, Cisco-ASA, WPA/WPA2, Double MD5, bcrypt,
Blowfish(OpenBSD), MD5(Sun), Double SHA1, SHA-3(Keccak),Half MD5,
Password Safe SHA-256, IKE-PSK MD5, IKE-PSK SHA1,
NetNTLMv1-VANILLA/NetNTLMv1-ESS, NetNTLMv2, Cisco-IOS SHA256,
Android PIN, AIX {smd5}, AIX {ssha256}, AIX {ssha512}, AIX {ssha1},
GOST, GOST R 34, Fortigate (FortiOS), OS X v10.8+, GRUB 2, IPMI2, RAKP,
HMAC-SHA1, sha256crypt, SHA256(Unix), Drupal7, WBB3, scrypt, Cisco $8$,
Cisco $9$, Radmin2, Django (PBKDF2-SHA256), Cram MD5, SAP, iSSHA-1,
PrestaShop, PostgreSQL, Challenge-Response Authentication (MD5),
MySQL Challenge-Response, Authentication (SHA1),
SIP digest authentication (MD5), Plaintext, Joomla < 2.5.18, PostgreSQL,
osCommerce, xt:Commerce, Skype, nsldap, Netscape, LDAP, nsldaps,
SSHA-1(Base64), Oracle S: Type (Oracle 11+), SMF > v1.1, OS X v10.4,
v10.5, v10.6, EPi, Django (SHA-1), MSSQL(2000), MSSQL(2005),
PeopleSoft, EPiServer 6.x < v4, hMailServer, SSHA-512(Base64),
LDAP {SSHA512}, OS X v10.7, MSSQL(2012 & 2014), vBulletin < v3.8.5,
PHPS, vBulletin > v3.8.5, IPB2+, MyBB1.2+, Mediawiki B type,
WebEdition CMS, Redmine.
.
Hashcat offers multiple attack modes for obtaining effective and
complex coverage over a hash's keyspace. These modes are:
.
* Brute-Force attack
* Combinator attack
* Dictionary attack
* Fingerprint attack
* Hybrid attack
* Mask attack
* Permutation attack
* Rule-based attack
* Table-Lookup attack
* Toggle-Case attack
* PRINCE attack
Description-md5: f1e089a5d1e0917eeac42f63c095fa76