Use john to crack the CentOS Password

Source: Internet
Author: User

Use john to crack the CentOS Password

John is a Linux password cracking tool that can crack the shadow password of a Linux system.

Official station: http://www.openwall.com/john/

Installation and use:

1234567 # wget http://www.openwall.com/john/j/john-1.8.0.tar.gz# tar xf john-1.8.0.tar.gz # cd john-1.8.0/src # make generic # Here you can view Redme, find the appropriate command to compile your system # cd .. /run # cp/etc/passwd/etc/shadow.

First, unshardow is required.

1 #./unshadow passwd shadow> mypasswd

Then officially start cracking

12345678910111213 #. /john mypasswd Loaded 1 password hash (bcrypt [Blowfish 32/64 X2]) Press 'q' or Ctrl-C to abort, almost any other key for status0g 0: 00: 00: 24 9% 2/3 0 g/s 614.5 p/s 614.5c/s 614.5C/s Loser1 .. lovers10g 0: 00: 01: 42 37% 2/3 0 g/s 616.1 p/s 616.1c/s 616.1C/s andromeda ?.. Angels? 0g 0: 00: 02: 40 63% 2/3 0 g/s 616.2 p/s 616.2c/s 616.2C/s lissabon9 .. mart90g 0: 00: 04: 58 3/3 0 g/s 615.8 p/s 615.8c/s 615.8C/s apech .. sarco0g 0: 00: 05: 08 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s 190574 .. 1906840g 0: 00: 05: 10 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s manne1 .. mannot0g 0: 00: 05: 13 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s anitoo .. animay0g 0: 00: 05: 58 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s 190530 .. 1905360g 0: 00: 07: 06 3/3 0 g/s 615.8 p/s 615.8c/s 615.8C/s johira .. johirl0g 0: 00: 07: 19 3/3 0 g/s 615.9 p/s 615.9c/s 615.9C/s jhanch .. jhancy

During the cracking process, you can press the key other than q to view the cracking process. The cracking result will be included in john. pot.

If the cracking process is interrupted, use the following command to resume the session and continue the cracking.

1 # john -- restore

Common options include

12. Create 10 accounts and save the session name myname to crack mypasswd #./john -- session = myname -- for = 10 mypasswd

The advantage of saving the session is that the session can be interrupted. After the session is interrupted, you can use-restore = myname to continue cracking.

You can also use-format to specify the format of the password file. For more information, see the following help information.

John's Command help

1234567891011121314151617181920212223242526 John the Ripper password cracker, version 1.8.0Copyright (c) 1996-2013 by Solar DesignerHomepage: http://www.openwall.com/john/Usage : John [OPTIONS] [PASSWORD-FILES] -- single "single crack" mode # simple cracking mode -- wordlist = FILE -- stdinwordlist mode, read words from FILE or stdin # dictionary cracking mode -- rulesenable word mangling rules for wordlist MODE -- incremental [= mode] "incremental" MODE [using section mode] # increase the cracking MODE -- external = MODEexternal mode or word filter -- stdout [= LENGTH] just output candidate passwords [cut at LENGTH] -- restore [= NAME] restore an interrupted session [called NAME] -- session = NAME give new session the NAME -- status [= NAME] print status of a session [called NAME] -- make-charset = FILEmake a charset, FILE will be overwritten -- show cracked passwords -- test [= TIME] run tests and benchmarks for TIME seconds each -- users = [-] LOGIN | UID [,...] [do not] load this (these) user (s) only -- groups = [-] GID [,...] load users [not] of this (these) group (s) only -- shells = [-] SHELL [,...] load users with [out] this (these) shell (s) only -- salts = [-] N load salts with [out] at least N passwords only -- save-memory = LEVELenable memory saving, at LEVEL 1 .. 3 -- node = MIN [-MAX]/TOTAL this node's number range out of TOTAL count -- fork = N fork N processes -- format = NAMEforce hash type NAME: descrypt/bsdicrypt/md5crypt/bcrypt/LM/AFS/tripcode/dummy

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.