The irst copies the results etc / shadow that had been practiced into the root, pentest, passwords, john with the format. txt
Next open application john the ripper.
Next type command john -si password.txt to display password
And now type command ls, to view the contents of the folder john.
And type command as below :
0 password hashes cracked, 5 left
root@bt:/pentest/passwords/john# ./unshadow /etc/passwd /etc/shadow > pass
root@bt:/pentest/passwords/john# ./john pass
Loaded 1 password hash (generic crypt(3) [?/32])
toor (root)
guesses: 1 time: 0:00:00:02 DONE (Tue Jan 31 03:47:40 2012) c/s: 36.64 trying: root - Root0
Use the "--show" option to display all of the cracked passwords reliably
root@bt:/pentest/passwords/john# ./john --show password.txt
0 password hashes cracked, 5 left
root@bt:/pentest/passwords/john# ./john --show pass
root:toor:0:0:root:/root:/bin/bash
1 password hash cracked, 0 left
root@bt:/pentest/passwords/john# ls
all.chr digits.chr genmkvpwd john-x86-mmx mailer password.txt sap_prepare.pl unafs
alnum.chr doc john john-x86-sse2 mkvcalcproba pdf2john sha-dump.pl undrop
alpha.chr dumb16.conf john.conf lanman.chr netntlm.pl rar2john sha-test.pl unique
calc_stat dumb32.conf john.log ldif2john.pl netscreen.py README ssh2john unshadow
cmpt_cp.pl dynamic.conf john.pot lion2john-alt.pl pass README-jumbo stats zip2john
crack.db genincstats.rb john-x86-any lion2john.pl password.lst relbench.pl tgtsnarf
root@bt:/pentest/passwords/john# cat crack.db
root:$6$LMhH9iIl$mtkH1abL22TXkpu11XTRZ27vKFPHAQySzyj4SrL6l6Uo5aLMWMS/WY7fiT9mBQN1zfSJ.mnLqnK.hJFIr5WSi0:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/bin/sh
man:x:6:12:man:/var/cache/man:/bin/sh
lp:x:7:7:lp:/var/spool/lpd:/bin/sh
mail:x:8:8:mail:/var/mail:/bin/sh
news:x:9:9:news:/var/spool/news:/bin/sh
uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh
proxy:x:13:13:proxy:/bin:/bin/sh
www-data:x:33:33:www-data:/var/www:/bin/sh
backup:x:34:34:backup:/var/backups:/bin/sh
list:x:38:38:Mailing List Manager:/var/list:/bin/sh
irc:x:39:39:ircd:/var/run/ircd:/bin/sh
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh
libuuid:x:100:101::/var/lib/libuuid:/bin/sh
syslog:x:101:103::/home/syslog:/bin/false
sshd:x:102:65534::/var/run/sshd:/usr/sbin/nologin
landscape:x:103:108::/var/lib/landscape:/bin/false
messagebus:x:104:112::/var/run/dbus:/bin/false
nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
mysql:!:105:113::/var/lib/mysql:/bin/false
avahi:*:106:114::/var/run/avahi-daemon:/bin/false
snort:*:107:115:Snort IDS:/var/log/snort:/bin/false
statd:*:108:65534::/var/lib/nfs:/bin/false
haldaemon:*:109:117::/var/run/hald:/bin/false
kdm:*:110:65534::/home/kdm:/bin/false
festival:*:111:29::/home/festival:/bin/false
usbmux:*:112:46::/home/usbmux:/bin/false
postgres:!:1000:1000::/home/postgres:/bin/sh
privoxy:*:113:65534::/etc/privoxy:/bin/false
debian-tor:*:114:121::/var/lib/tor:/bin/bash
clamav:!:115:122::/var/lib/clamav:/bin/false
1 comments:
Shadow 023: Cracking Passwords Using John The Ripper >>>>> Download Now
>>>>> Download Full
Shadow 023: Cracking Passwords Using John The Ripper >>>>> Download LINK
>>>>> Download Now
Shadow 023: Cracking Passwords Using John The Ripper >>>>> Download Full
>>>>> Download LINK Md
Post a Comment