john the ripper

Password Cracking With John The Ripper – Cracking RAR/ZIP & Linux Passwords

Password cracking with John the Ripper

What is John the Ripper?

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version

Cracking ZIP/RAR files

  1. Getting the password hash – zip2john / rar2john <> > hash.txt
  2. Cracking the password with John – john –format=zip/rar hash.txt
  3. Done

Cracking Linux Passwords

  1. Shadow file location – /etc/shadow
  2. Cracking the shadow file – john /etc/shadow
  3. Done


Liked it? Take a second to support Alexis on Patreon!
Share this post

Leave a Reply

Your email address will not be published. Required fields are marked *


How To Generate Wordlists With Crunch | Kali Linux

What is Crunch? Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all possible combinations and permutations. Features: crunch generates wordlists in both combination and permutation ways it can breakup output by number of lines or file size now has resume support […]

Share this post

Brute Force Password Cracking With Medusa

What is Medusa? Medusa is a speedy, parallel, and modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. Flexible user […]

Share this post