Practical CEH Notes & Tools
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • πŸ““Practical Ethical Hacker Notes
    • πŸ“šMain Contents
      • 2 - Footprinting & Recon
      • 3 - Scanning Networks
      • 4 - Enumeration
      • 5 - Vulnerability Analysis
      • 6 - System Hacking
      • 7 - Malware
      • 8 - Sniffing
      • 10 - DoS
      • 11 - Session Hijacking
      • 13 - Hacking Web Servers
      • 14 - Hacking Web Apps
      • 15 - SQL Injection
      • 16 - Hacking Wireless
      • 17 - Hacking Mobile
      • 18 - IoT and OT Hacking
      • 19 - Cloud Computing
      • 20 - Cryptography
    • πŸ‘¨β€πŸŽ“Study Walkthrough
      • πŸ§ͺLabs and Training
    • Tools πŸ› οΈ
      • πŸ€–Adb tool
      • πŸ”BCTextEncoder
      • 🟧Burp Suite
      • πŸ‘¨β€πŸ’»Cewl
      • πŸ“Crunch
      • πŸ—ƒοΈDirb
      • 🐧Enum4linux
      • πŸ”—Gobuster
      • πŸ”“Hashcalc
      • 😺Hashcat
      • πŸ‘‰Hping3
      • πŸ‰Hydra
      • πŸ₯·John the Ripper
      • Ⓜ️Metasploit
      • 5️⃣Md5 Calculator
      • πŸ‘½Nikto
      • πŸ‘οΈNmap
      • πŸ–ΌοΈOpenstego
      • 🎨QuickStego
      • 🌈RainbowCrack
      • ↗️Responder LLMNR
      • πŸ•·οΈSearchsploit
      • β›„Snow
      • πŸŒ€Stego
      • πŸ’‰SQLMap
      • βš™οΈSteghide
      • βš—οΈStegimage
      • πŸ”‘Veracrypt
      • 🦈Wireshark or Tcpdump
      • πŸ”WPScan
      • ⚑Zap
Powered by GitBook
On this page
  • Windows
  • Linux
  • Other References:
  1. Practical Ethical Hacker Notes
  2. Tools πŸ› οΈ

John the Ripper

https://www.kali.org/tools/john/

Windows

john --list=formats | grep NT
john --format=NT hashes.txt

gzip -d /usr/share/wordlists/rockyou.txt.gz
john <Hash_Password-File> --wordlist=/usr/share/wordlists/rockyou.txt # To crack the password from your previous output (hashdump,shadow file )
john --format=NT win_hashes.txt --wordlist=/usr/share/wordlists/rockyou.txt

john -wordlist /usr/share/wordlists/rockyou.txt crack.hash
john -wordlist /usr/share/wordlists/rockyou.txt -users users.txt test.hash

#this is another way to crack passwords (that requires shadow file with passwd file)
unshadow passwd shadow > unshadowed.txt
john --wordlist=/usr/share/wordlists/rockyou.txt unshadowed.txt

Linux

at /etc/shadow

# Metasploit
use post/linux/gather/hashdump

john --format=sha512crypt linux.hashes.txt --wordlist=/usr/share/wordlists/rockyou.txt
john -wordlist /usr/share/wordlists/rockyou.txt crack.hash
john -wordlist /usr/share/wordlists/rockyou.txt -users users.txt test.hash

#Single crack mode
john --single --format=raw-sha1 crack.txt

#Crack the password in file using wordlist
john --wordlist=/usr/share/john/password.lst --format=raw-sha1 crack.txt (Crack.txt here contains the hashes)

#Cracking service credentials like SSH
1. First have to convert the hash file to JOHN format : ssh2john /home/text/.ssh/id_rsa > crack.txt (Now we need to crack this crack.txt file with John The Ripper)
2. john --wordlist=/usr/share/wordlists/rockyou.txt crack.txt

#To crack ZIP
1. zip2john file.zip > crack.txt
2. john --wordlist=/usr/share/wordlists/rockyou.txt crack.txt

#Notes:
–wordlist can be written as -w also
john crack.txt --wordlist=rockyou.txt --format=Raw-SHA256

Other References:

PreviousHydraNextMetasploit

Last updated 1 year ago

- Video Tutorial

πŸ““
πŸ₯·
Password Cracking With John The Ripper - RAR/ZIP & Linux Passwords
john | Kali Linux ToolsKali Linux
Password cracking with John the Ripper on LinuxLinux Tutorials - Learn Linux Configuration
How to crack passwords with John the RipperMedium
How to Use John the Ripper: Tips and TutorialsVaronis
Logo
Logo
Logo
Logo