This activity is ungraded.
Remember: Be sure to watch these Demo videos from this unit before trying this activity. Watching me do it first will help you understand each of the steps.
Dictionary Attacks with John the Ripper
System: You can complete this activity on any system.
Time: This activity should take you approximately 30 minutes to complete.
To experience how John the Ripper cracks passwords.
Note: Hit Enter after each command.
Launch your Kali Virtual machine and open a terminal. (Instructions for this were included in Unit 1.)Enter john, which will display usage help.There is also a man page for john: man john. Enter q to quit.Enter john –test. This will give you an idea of how long it will take john to crack passwords based on various cryptographic schemes.I've purposely chosen dictionary words because the complexity of the password is inversely related to the time necessary to crack it.
In Linux, the /etc/passwd file contains potential information in the GECOS field: full name, room number, work phone, home phone, and other.
Linux stores its passwords in /etc/shadow file.
The unshadow tool combines the /etc/passwd and /etc/shadow files, so John the Ripper can use them.
Enter unshadow by itself to see its usage.Now enter unshadow /etc/passwd /etc/shadow > rochester.txt.Take a look at this contents of this file, specifically the hashes: cat rochester.txt.After you've finished, answer the Check Your Work questions.
转载于:https://www.cnblogs.com/sec875/articles/10015977.html
相关资源:Cracking.the.Coding.Interview.189.Programming.Questions.and.Solutions