« John the Ripper » : différence entre les versions
De wikilivois
Aller à la navigationAller à la recherche
Aucun résumé des modifications |
Aucun résumé des modifications |
||
Ligne 16 : | Ligne 16 : | ||
Afficher les résultats | Afficher les résultats | ||
$sudo john –show mypasswd | $sudo john –show mypasswd | ||
=Ajouter des dictionnaires= | |||
* https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm | |||
* http://contest-2012.korelogic.com/ (Download the password hash file bundle) | |||
* http://contest.korelogic.com/wordlists/Feb-10-2011/final-fr-wikipedia.dic.gz | |||
* http://downloads.skullsecurity.org/passwords/rockyou.txt.bz2 | |||
=Optimiser la recherche pour Ubuntu | |||
Remplacer sha512 par md5 dans common-password: | |||
<licode file=/etc/pam.d/common-password> | |||
# here are the per-package modules (the "Primary" block) | |||
password [success=1 default=ignore] pam_unix.so obscure sha512 | |||
</licode> | |||
<licode file=/etc/pam.d/common-password> | |||
# here are the per-package modules (the "Primary" block) | |||
password [success=1 default=ignore] pam_unix.so obscure md5 | |||
</licode> | |||
=Afficher l'avancement= | =Afficher l'avancement= |
Version du 2 février 2019 à 10:56
https://www.openwall.com/john/doc/
Installer et lancer
Installer John
$sudo apt-get install john
Préparer le fichier
$sudo unshadow /etc/passwd /etc/shadow > mypasswd
Lancer la recherche de mots de passe
$sudo john mypasswd
Afficher les résultats
$sudo john –show mypasswd
Ajouter des dictionnaires
- https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm
- http://contest-2012.korelogic.com/ (Download the password hash file bundle)
- http://contest.korelogic.com/wordlists/Feb-10-2011/final-fr-wikipedia.dic.gz
- http://downloads.skullsecurity.org/passwords/rockyou.txt.bz2
=Optimiser la recherche pour Ubuntu
Remplacer sha512 par md5 dans common-password: <licode file=/etc/pam.d/common-password>
- here are the per-package modules (the "Primary" block)
password [success=1 default=ignore] pam_unix.so obscure sha512 </licode>
<licode file=/etc/pam.d/common-password>
- here are the per-package modules (the "Primary" block)
password [success=1 default=ignore] pam_unix.so obscure md5 </licode>
Afficher l'avancement
$sudo john --status
While John the Ripper is running, press any key (like enter) to see a status output. Or to check from another terminal you can run john --status. The output looks like this:
DES cracking speed: 94g 0:01:08:34 74% 2/3 0.02284g/s 2784p/s 97648c/s 269491C/s day?..Hal? 1 2 3 4 5 6 7 8 9 10
Here is what each section means:
- Type of encryption it is trying to crack with
- Number of successful password guesses
- Time elapsed since started
- Percent completed for that pass
- Current pass / number of passes total
- g/s = successful guesses per second
- p/s = passwords tested per second
- c/s = crypts (password hashes) computed per second
- C/s = crypts tested per second (in versions below 1.8.0 this was “c/s”)
- The current word it’s trying.