John the RipperEagle 65
John The Ripper
John the Ripper is an open source password cracking tool it’s run in both brute force and dictionary attack modes. u can found it on Parrot and Kali Linux just type john in terminal .
- Of course is a lot of examples to talk about so let’s see the basic usage of john
1- Cracking hash
Let’s say we have hash file that have md5 hash we want to crack it you also can use your own word list hash_to_crack.txt is the file that have the hash
Also u can use your own word list by type john format=raw-md5 wordlist= (path to wordlist) windows_hash.txt
2-cracking Linux user password
As we know user password is saved in /etc/shadow so One way is to use john /etc/shadow directly, but we recommend you take a somewhat different way. remember that this applies to systems using shadow passwords, and all the modern Linux distributions do.
you can use your own word list by type john –format= LM wordlist= (path to wordlist) windows_hash.txt like previous example
3- cracking windows user password
let’s say u can get windows password hash by anyway like pwdump or remote code execution etc
u can use your own word list by type john –format= LM wordlist= (path to wordlist) windows_hash.txt like previous example
check crunch tool to know how to create your own word list
And in future lessons we will learn you more advanced use of john like how to pause your cracking and continue it in another time