Hello. My name is Dustin, and welcome to password cracking John the Ripper. Not to be confused with Jack is a free and open source password cracker.
It can do both dictionary based attacks, brute forcing and also a combination of the two. It was initially developed for the UNIX operating system and was originally designed to detect week UNIX passwords. It now runs on many operating systems, including a version for Android. Even
it's typically shared via the source code, but it does offer a more friendly pro version. The Windows version of it even offers a gooey, since it is typically a command line interface tool.
As with most security tools we've talked about, they do come preinstalled on most versions of Cali, Lennox and John The Ripper is no different. So if you're working with the Cali Lennox machine or a Cali Lennox PM, there isn't anything you need to do. Just run the commands.
Installing it on other versions of Lennox, including, like unto, can be pretty easy as well. They offer the free version, which you must compile yourself, or a paid version that comes with customer support and installation, walk throughs and support to do that
of the basic steps to install it on a new bun to Orlen experience are just download. The latest version
confirmed the signature. This is something you really always want to do. When you're looking for security tools or hacking tools anything like that, you want to make sure you're getting exactly what you think you are. And if you remember from our other module, we talked about getting the hash for that file and comparing the hashes.
So once you know that the hash is matching, it is the John the Ripper version that you were looking for. You un compressed the file and compiled the sources.
After that, you install it via the normal Install command. So Damian versions of Lennox. It's just act, get install. Or, if you're using other versions, you can use a Yum install and then John
for Windows. It's really easy. There is, ah, regular John the Ripper command line tool, and you just download that and extract it and run it from the command line. And they do have the gooey version, um, half sweet, which will actually get into in the next part,
and that one you just download of installer extract the file and then just run it like you would any other Windows installer
in this lab. We're going to be using John the Ripper in order to crack our windows passwords.
And we've got those hash is that we dumped from our Windows machine and we're gonna load them and use our custom dictionary in order to crack the passwords. Then we're going to hop into our linen virtual machine
and do the same thing. We're gonna create a couple of new users
and trained crack those passwords as well.
So let's go ahead and hop into our Windows machine.
There we go.
And so if you notice I've already downloaded John the Ripper and I extracted the file. So in order to run it, you do need to run it from the folder location at Sand. And that's where we're gonna put all of our files as well. It makes it a lot easier when everything's in the same location.
So open your John, um, folder, and then we're going to open
the run folder
and this is where rules we're gonna have a couple of our files.
So the file are the after that we're gonna crack our windows, not text. And we open that up.
You can see this. Just kind of your standard, um, password Dump output.
And so it's got your years. The name and then a couple hash is as well, and we're actually gonna be using our custom word lists because we did a lot of re come and we learned what the users in this area like. And so we think will be a little faster to use a custom word list. And so let's show you that really quick. There is custom wordless.
So this is the real quick word list. We don't want this to take
forever, but this is just as you can see, just a list of words. And John, they're cool will go through these and see if it can match any of the hashes.
So let's go and get started. If you hold a shift and right click in the folder, let's get in here.
You can see the open command window here, and that will open. The command would know in this exact directory, which is where we want to be, so we don't have to see the or change directory all the way in here.
As you can see, we are right here. So in order to run, John the Ripper is pretty easy. The command for General Motors istan.
And we're gonna do gas stash. Although most of the options are all dash dash, um, format, because we know these are anti hashes because they're from the Windows machine,
and then we will do dash cash
We want to use our own custom. Wordless John the Ripper does have its own built in wordless. But we're gonna use ours because we think it's gonna go a little bit faster.
And so here we would just name it us, um, word list text, because that's our
wordless that we already built. And then the next thing you need to type is just the name of the file with hash is that you'd like cracked and ours is just windows
So once we hit enter, it will run through it. You can see it loaded. Six password hash is no different. Sultan. It'll actually print out the ones that cracked right here. Right here is well, But if you're cracking a whole bunch of passwords or the output gets jumbled or anything, you can actually show the passwords using John.
So what we'll do is we will do John
Dash, Dash show In the name of the file. We want the passwords,
uh, that we cracked previously.
And I have seen this before where it gets kind of wonky. Um, it's showing that didn't crack any. But we see right here that it is. So let's go ahead and we can take a look at the
I believe, john dot pot
there is. And so this is kind of like the cache file for it. Um, if we go ahead and we will rename it
we're gonna open it. You could see it actually did crack those passwords. So the 1st 1 to God was Jell O Best boss and mega desk Indian CDs of the same ones and hear it lists the user name as well. So Jim's Jello Michael was best boss, and Dwight was mega desk.
So in our next lab, we're actually gonna hop into our Callie linens machine and do some similar cracking with that And the John the Ripper Tool
Configure Windows Defender on a Windows System
This IT Pro Challenge helps learners understand how Microsoft Windows Defender works. Participants will learn ...
Learn On Demand
Identify Attack Types
In this IT Pro Challenge virtual lab, you will be challenged through a series of ...
Learn On Demand