CRACKING PASSWORDS USING JOHN THE RIPPER

Ok GUIs
The irst  copies the results etc / shadow that had been practiced into the root, pentest, passwords, john with the format. txt

Next open application john the ripper.


Next type command  john -si password.txt to display password


And now type command ls, to view the contents of the folder john.




And type command as below :

root@bt:/pentest/passwords/john# ./john --show password.txt
0 password hashes cracked, 5 left
root@bt:/pentest/passwords/john# ./unshadow /etc/passwd /etc/shadow > pass
root@bt:/pentest/passwords/john# ./john pass
Loaded 1 password hash (generic crypt(3) [?/32])
toor             (root)
guesses: 1  time: 0:00:00:02 DONE (Tue Jan 31 03:47:40 2012)  c/s: 36.64  trying: root - Root0
Use the "--show" option to display all of the cracked passwords reliably
root@bt:/pentest/passwords/john# ./john --show password.txt
0 password hashes cracked, 5 left
root@bt:/pentest/passwords/john# ./john --show pass
root:toor:0:0:root:/root:/bin/bash

1 password hash cracked, 0 left


root@bt:/pentest/passwords/john# ./unshadow /etc/passwd /etc/shadow > crack.db
root@bt:/pentest/passwords/john# ls
all.chr     digits.chr      genmkvpwd     john-x86-mmx      mailer        password.txt  sap_prepare.pl  unafs
alnum.chr   doc             john          john-x86-sse2     mkvcalcproba  pdf2john      sha-dump.pl     undrop
alpha.chr   dumb16.conf     john.conf     lanman.chr        netntlm.pl    rar2john      sha-test.pl     unique
calc_stat   dumb32.conf     john.log      ldif2john.pl      netscreen.py  README        ssh2john        unshadow
cmpt_cp.pl  dynamic.conf    john.pot      lion2john-alt.pl  pass          README-jumbo  stats           zip2john
crack.db    genincstats.rb  john-x86-any  lion2john.pl      password.lst  relbench.pl   tgtsnarf
root@bt:/pentest/passwords/john# cat crack.db
root:$6$LMhH9iIl$mtkH1abL22TXkpu11XTRZ27vKFPHAQySzyj4SrL6l6Uo5aLMWMS/WY7fiT9mBQN1zfSJ.mnLqnK.hJFIr5WSi0:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/bin/sh
man:x:6:12:man:/var/cache/man:/bin/sh
lp:x:7:7:lp:/var/spool/lpd:/bin/sh
mail:x:8:8:mail:/var/mail:/bin/sh
news:x:9:9:news:/var/spool/news:/bin/sh
uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh
proxy:x:13:13:proxy:/bin:/bin/sh
www-data:x:33:33:www-data:/var/www:/bin/sh
backup:x:34:34:backup:/var/backups:/bin/sh
list:x:38:38:Mailing List Manager:/var/list:/bin/sh
irc:x:39:39:ircd:/var/run/ircd:/bin/sh
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh
libuuid:x:100:101::/var/lib/libuuid:/bin/sh
syslog:x:101:103::/home/syslog:/bin/false
sshd:x:102:65534::/var/run/sshd:/usr/sbin/nologin
landscape:x:103:108::/var/lib/landscape:/bin/false
messagebus:x:104:112::/var/run/dbus:/bin/false
nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
mysql:!:105:113::/var/lib/mysql:/bin/false
avahi:*:106:114::/var/run/avahi-daemon:/bin/false
snort:*:107:115:Snort IDS:/var/log/snort:/bin/false
statd:*:108:65534::/var/lib/nfs:/bin/false
haldaemon:*:109:117::/var/run/hald:/bin/false
kdm:*:110:65534::/home/kdm:/bin/false
festival:*:111:29::/home/festival:/bin/false
usbmux:*:112:46::/home/usbmux:/bin/false
postgres:!:1000:1000::/home/postgres:/bin/sh
privoxy:*:113:65534::/etc/privoxy:/bin/false
debian-tor:*:114:121::/var/lib/tor:/bin/bash
clamav:!:115:122::/var/lib/clamav:/bin/false

1 comments:

Anonymous said...

Shadow 023: Cracking Passwords Using John The Ripper >>>>> Download Now

>>>>> Download Full

Shadow 023: Cracking Passwords Using John The Ripper >>>>> Download LINK

>>>>> Download Now

Shadow 023: Cracking Passwords Using John The Ripper >>>>> Download Full

>>>>> Download LINK Md

Post a Comment