Eikonal Blog

2010.05.25

John the Ripper

Filed under: infosec — Tags: , , , , , — sandokan65 @ 15:16

Places

Simple dictionary-based cracking

For Linux systems, the hashed passwords are contained in the /etc/shadow file. To use John the ripper, one needs both that file and /etc/passwd.

  • Unshadowing:
    ./unshadow.exe passwd.txt shadow.txt > passwd-unshadowed.txt
  • To run John against the unshadowed password file passwdFile-unshadowed.txt using the predefined word-list mywords.lst, run
    following:
    ./john.exe –wordlist=mywords.lst passwd-unshadowed.txt
  • To see the cracked passwords run:
    ./john.exe –show passwdFile-unshadowed.txt
  • and to save that file:
    ./john.exe –show passwdFile-unshadowed.txt > passwdFile-cracked.txt

Articles


Related here: Default passwords, wordlist and Rainbow tables – https://eikonal.wordpress.com/2010/03/29/default-passwords/ | Passwords cracking – https://eikonal.wordpress.com/2010/01/06/password-crackers/

4 Comments »

  1. […] Related here: John the Ripper – https://eikonal.wordpress.com/2010/05/25/john-the-ripper/ Share this:StumbleUponDiggRedditLike this:LikeBe the first to like this post. Comments […]

    Like

    Pingback by Default passwords, wordlist and Rainbow tables « Eikonal Blog — 2012.03.07 @ 10:25

  2. […] More details here: https://eikonal.wordpress.com/2010/05/25/john-the-ripper/ […]

    Like

    Pingback by Passwords cracking | Eikonal Blog — 2013.12.02 @ 14:13


RSS feed for comments on this post. TrackBack URI

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Blog at WordPress.com.

%d bloggers like this: