Forum Thread: Cracking Passwords Using John the Ripper

Hello, today I am going to show you how to crack passwords using a Kali Linux tools.
Remember, almost all my tutorials are based on Kali Linux so be sure to install it.
I am going to show you these :
1. Cracking Linux User Password
2.Cracking Password Protected ZIP/RAR Files
3.Decrypting MD5 Hash
4.Using Wordlists To Crack Passwords
Lets begin.

Cracking Linux User Password

The linux user password is saved in /etc/shadow folder.
So to crack it, we simply type :

john /etc/shadow

It will take a while depending on your system.

Cracking Password Protected ZIP/RAR Files

First, go to the directory of the file.
I will assume that everyone here can do that.
After, use this command :

zip2john zipfile > output.txt

(If it is a RAR file, replace the zip in the front to rar.)

Replace the "zipfile" with the name of the zip file you are trying to crack and replace the "output.txt" with any name that is a .txt format.

After that command, you will see that it would have maked a text file.
The hashes are stored in that file.
To crack the hash, type :

john --format=zip hashfilepath

Again, replace the "hashfilepath" to yours. Mine is just an example.
Now, wait, and you can see it is cracked.

Now go in the zip file and put the password.

Decrypting MD5 Hash

I have my Hash over here :

Now, lets use john to decrypt it.
To decrypt it, use this :

john --format=raw-md5 hashfilepath

Again, repl......
I won't say it.
And now enter, and should take a while and it will decrypt it.

And boom.

Using Wordlists to Crack Passwords

I don't really recommend this one, but there are some peoples out there using this to crack...
I will crack a hash that is inside a text file.
I have a wordlist here, and I named it password.txt.
To use the wordlist and crack the file, do :

john --format=raw-shal --wordlist password.txt THEHASHFILE.txt

You know what you gotta do.

Any Errors?

If you got any errors, comment down and I will try to help you out.
Remember that you need john the ripper to do this.

6 Responses

Nice! But in the wordlist one, doesn't it take more time to do the process?

No, if it is in the list, it will be more efficient, and if you want to crack lots of hashes at once then make sure your laptop has a fan since that uses 100% CPU, and it might fry.

sir how to change default threshold.. ans me as soon as possible

Hy all!

I need some more help with john. I used it with aircrack -ng testing on my wifi, my password is picciotto18. Here is the command I use:

sudo john -w=/home/nicola/diznic.txt -rules: --session=attack1 --stdout | aircrack-ng -b E0:CB:EE:7A:CA:DB Pichini*.cap -w -

I use a wordlist diznic.txt, but I still don'understand how to teach john which kind of pw try: if in wordlist I write exactly picciotto18 aircrack obviously got it, but if I add in wordlist only picciotto and some numbers (0-9) john tried some mix as picciotto1, 1picciotto, etc, but it don't mix until picciotto18.

If I know the mask of a password (a-z,A-Z,0-9, length 8 for example), how to teach john to try all mix? How to write a good wordlist to make it start trying?

A step-by-step guide will be appreciated, I- have read many tutorial but still didn't find my exact issue. Thanks in advance.

I will say good but for the beginners they wont understand try to explain more but good job

root@kali:~/Desktop# zip2john test.zip
test.zip:$zip2$030be99d6ab9f06add800000000000000002c26ffffffe4ZFILEtest
.zip052ffffffffffffffffffff$/zip2$:::::test.zip

root@kali:~/Desktop# zip2john test.zip > hash.txt

root@kali:~/Desktop# clear

root@kali:~/Desktop# john --format=zip hash.txt

Created directory: /root/.john

zip-aes file validation failed Not enough data in .zip file test.zip, to read the zip authentication data. Hash is $zip2$030be99d6ab9f06add800000000000000002c26ffffffe4ZFILEtest.zip052ffffffffffffffffffff$/zip2$

Using default input encoding: UTF-8
No password hashes loaded (see FAQ)
root@kali:~/Desktop#

please help me..
i recevied error like this john the ripper

Share Your Thoughts

  • Hot
  • Active