Offline Password Cracking with John the Ripper – Tutorial

Offline Password Cracking with John the Ripper – Tutorial

John the Ripper is intended to be both elements rich and quick. It combines a few breaking modes in one program and is completely configurable for your specific needs.

Extracting hashes From Linux

Every Linux user know that the passwords hashed are stored in /etc/passwd, one can see the file using command root@kali:~# cat /etc/passwd

We can see the password hashed as X, to unmask the password we should use unshadow to unmask the passwords.

root@kali:~# unshadow
Usage: unshadow PASSWORD-FILE SHADOW-FILE

Now you should use the unshadow command in order to unmask/decrypt the passwords.

root@kali:~# unshadow /etc/passwd /etc/shadow > hashfile/etc/passwd : Password location  /etc/shadow : Shadow file hashfile : Output file


Read Full Article: Offline Password Cracking with John the Ripper

Follow us for Daily Security Updates: GBHackers On security

要查看或添加评论,请登录

Gurubaran KS的更多文章

社区洞察

其他会员也浏览了