64-bit CentOS uses John to crack the simple password, No password hashes loaded
64-bit CentOS uses John to crack the simple password, No password hashes loaded
1n-download john-1.8.0.tar.gz
2. installation:
① Decompression: tar zxfm john-1.8.0.tar.gz
② Cd src/
③ Make clean linux-86-64
Note:
(You cannot use make clean generic. This method is always unsuccessful,
No password hashes loaded,
The reason is that the 64-bit system cannot recognize the shadow file)
④ Cd ../run // enter the run directory
⑤ Tail-1/etc/shadow mypassword
// Obtain the user and password encryption information from the shadow file,
-1 (number 1) is the information added when the last user is added, that is, the last line.
6./john -- incremental = Digits -- fork = 30 mypassword
// Use the brute force mode to crack and use 30 processes to speed up the cracking
7. Generate the john. pot file, which contains the password encryption information and cracking results.
View the cracking result:
./John -- show mypassword
Good! Successful.
Appendix:
#./Unshadow/etc/passwd/etc/shadow> password.txt ---> export the user password to the current txt file
#./John -- single password.txt ---> simple mode cracking
#./John -- wordlist = password. lst password.txt ---> dictionary mode cracking. You can add more rules in it.
#./John -- incremental password.txt ---> brute force mode cracking: time-consuming, labor-consuming...
#./John -- show password.txt ---> check that the password is successfully cracked. The corresponding password exists in the john. pot file.
# -- Format = des/bsdi/md5/bf/afs/lm/trip/dummy multiple attack types are available
64-bit CentOS 6.5 Installation Method
64-bit CentOS 6.4 dual-system installation in Win7
Precautions for installing CentOS and Windows systems
Install Windows 8 and CentOS on UEFI + GPT
Windows 8.1 and CentOS6.5 dual-system installation
Basic Optimization after CentOS 5.6 Linux is installed