Use john to crack the CentOS Password
John is a Linux password cracking tool that can crack the shadow password of a Linux system.
Official station: http://www.openwall.com/john/
Installation and use:
1234567 # wget http://www.openwall.com/john/j/john-1.8.0.tar.gz# tar xf john-1.8.0.tar.gz # cd john-1.8.0/src # make generic # Here you can view Redme, find the appropriate command to compile your system # cd .. /run # cp/etc/passwd/etc/shadow.
First, unshardow is required.
1 #./unshadow passwd shadow> mypasswd
Then officially start cracking
12345678910111213 #. /john mypasswd Loaded 1 password hash (bcrypt [Blowfish 32/64 X2]) Press 'q' or Ctrl-C to abort, almost any other key for status0g 0: 00: 00: 24 9% 2/3 0 g/s 614.5 p/s 614.5c/s 614.5C/s Loser1 .. lovers10g 0: 00: 01: 42 37% 2/3 0 g/s 616.1 p/s 616.1c/s 616.1C/s andromeda ?.. Angels? 0g 0: 00: 02: 40 63% 2/3 0 g/s 616.2 p/s 616.2c/s 616.2C/s lissabon9 .. mart90g 0: 00: 04: 58 3/3 0 g/s 615.8 p/s 615.8c/s 615.8C/s apech .. sarco0g 0: 00: 05: 08 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s 190574 .. 1906840g 0: 00: 05: 10 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s manne1 .. mannot0g 0: 00: 05: 13 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s anitoo .. animay0g 0: 00: 05: 58 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s 190530 .. 1905360g 0: 00: 07: 06 3/3 0 g/s 615.8 p/s 615.8c/s 615.8C/s johira .. johirl0g 0: 00: 07: 19 3/3 0 g/s 615.9 p/s 615.9c/s 615.9C/s jhanch .. jhancy
During the cracking process, you can press the key other than q to view the cracking process. The cracking result will be included in john. pot.
If the cracking process is interrupted, use the following command to resume the session and continue the cracking.
1 # john -- restore
Common options include
12. Create 10 accounts and save the session name myname to crack mypasswd #./john -- session = myname -- for = 10 mypasswd
The advantage of saving the session is that the session can be interrupted. After the session is interrupted, you can use-restore = myname to continue cracking.
You can also use-format to specify the format of the password file. For more information, see the following help information.
John's Command help
1234567891011121314151617181920212223242526 John the Ripper password cracker, version 1.8.0Copyright (c) 1996-2013 by Solar DesignerHomepage: http://www.openwall.com/john/Usage : John [OPTIONS] [PASSWORD-FILES] -- single "single crack" mode # simple cracking mode -- wordlist = FILE -- stdinwordlist mode, read words from FILE or stdin # dictionary cracking mode -- rulesenable word mangling rules for wordlist MODE -- incremental [= mode] "incremental" MODE [using section mode] # increase the cracking MODE -- external = MODEexternal mode or word filter -- stdout [= LENGTH] just output candidate passwords [cut at LENGTH] -- restore [= NAME] restore an interrupted session [called NAME] -- session = NAME give new session the NAME -- status [= NAME] print status of a session [called NAME] -- make-charset = FILEmake a charset, FILE will be overwritten -- show cracked passwords -- test [= TIME] run tests and benchmarks for TIME seconds each -- users = [-] LOGIN | UID [,...] [do not] load this (these) user (s) only -- groups = [-] GID [,...] load users [not] of this (these) group (s) only -- shells = [-] SHELL [,...] load users with [out] this (these) shell (s) only -- salts = [-] N load salts with [out] at least N passwords only -- save-memory = LEVELenable memory saving, at LEVEL 1 .. 3 -- node = MIN [-MAX]/TOTAL this node's number range out of TOTAL count -- fork = N fork N processes -- format = NAMEforce hash type NAME: descrypt/bsdicrypt/md5crypt/bcrypt/LM/AFS/tripcode/dummy