John
John (aka John the Ripper) is a fast password cracker, currently available for many flavors of Unix, macOS, Windows, DOS, BeOS, and OpenVMS
Link: https://github.com/magnumripper/JohnTheRipper
Simple usage
JTR password cracking
john --wordlist=/usr/share/wordlists/rockyou.txt hashes
JTR forced descrypt cracking with wordlist
john --format=descrypt --wordlist /usr/share/wordlists/rockyou.txt hash.txt
JTR forced descrypt brute force cracking
john --format=descrypt hash --show
Display formats:
john --list=formats
Type and mask:
iron@kali2:/tmp$ sudo john lm.txt --mask=?l?l?l?l --format=lm
mask
Create a mask:
example:
example with numbers in the middle:
A mask may consist of:
Windows
C:\Users\David\Documents\Tools\john-1.9.0-jumbo-1-win64\run>john.exe ..\test.txt --format=raw-MD5
Formats
Common formats:
Type | John Format | Hash Example |
MD5 | raw-md5 | fc16ea469c37da07bac3ddbbdbfb3945 |
LM | lm | 299BD128C1101FD6 |
NTLM | nt | B4B9B02E6F09A9BD760F388B67351E2B |
NTLMv1 | netntlm | netntlm::kNS:338d08f8e26de93300000000000000000000000000000000:9526fb8c23a90751cdd619b6cea564742e1e4bf33006ba41:cb8086049ec4736c |
NTLMv2 | netntlmv2 | admin::N46iSNekpT:08ca45b7d7ea58ee:88dcbe4446168966a153a0064958dac6:5c7830315c7830310000000000000b45c67103d07d7b95acd12ffa11230e0000000052920b85f78d013c31cdb3b92f5d765c783030 |
Cisco Type 5 | Md5crpy | enable_secret_level_2:$1$WhZT$YYEI3f0wwWJGAXtAayK/Q. |
All Formats:
Cracking examples
Cracking /etc/shadow
Cracking pdf protected password
Cracking ssh key
MD5 wordlist
John cheat sheet
https://countuponsecurity.files.wordpress.com/2016/09/jtr-cheat-sheet.pdf
Last updated