Use john to crack the linux Password

Source: Internet
Author: User

John is a Linux password cracking tool that can crack the shadow password of a Linux system.

Official station: http://www.openwall.com/john/

Installation and use:

1 2 3 4 5 6 7 # wget http://www.openwall.com/john/j/john-1.8.0.tar.gz # tar xf john-1.8.0.tar.gz # cd john-1.8.0/src # make generic # Here you can view Redme, find the appropriate command to compile # cd .. /run # cp/etc/passwd/etc/shadow.

First, unshardow is required.

1 #./unshadow passwd shadow> mypasswd

Then officially start cracking

1 2 3 4 5 6 7 8 9 10 11 12 13 #. /john mypasswd Loaded 1 password hash (bcrypt [Blowfish 32/64 X2]) Press 'q' or Ctrl-C to abort, almost any other key for status 0g 0: 00: 00: 24 9% 2/3 0 g/s 614.5 p/s 614.5c/s 614.5C/s Loser1 .. lovers1 0g 0: 00: 01: 42 37% 2/3 0 g/s 616.1 p/s 616.1c/s 616.1C/s andromeda ?.. Angels? 0g 0: 00: 02: 40 63% 2/3 0 g/s 616.2 p/s 616.2c/s 616.2C/s lissabon9 .. mart9 0g 0: 00: 04: 58 3/3 0 g/s 615.8 p/s 615.8c/s 615.8C/s apech .. sarco 0g 0: 00: 05: 08 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s 190574 .. 190684 0g 0: 00: 05: 10 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s manne1 .. mannot 0g 0: 00: 05: 13 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s anitoo .. animay 0g 0: 00: 05: 58 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s 190530 .. 190536 0g 0: 00: 07: 06 3/3 0 g/s 615.8 p/s 615.8c/s 615.8C/s johira .. johirl 0g 0: 00: 07: 19 3/3 0 g/s 615.9 p/s 615.9c/s 615.9C/s jhanch .. jhancy

During the cracking process, you can press the key other than q to view the cracking process. The cracking result will be included in john. pot.

If the cracking process is interrupted, use the following command to resume the session and continue the cracking.

1 # john -- restore

Common options include

1 2 account opening 10 processes, save the session name myname to crack mypasswd #./john -- session = myname -- for = 10 mypasswd

The advantage of saving the session is that the session can be interrupted. After the session is interrupted, you can use-restore = myname to continue cracking.

You can also use-format to specify the format of the password file. For more information, see the following help information.

John's Command help

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 21 22 23 24 25 26 John the Ripper password cracker, version 1.8.0 Copyright (c) 1996-2013 by Solar Designer Homepage: http://www.openwall.com/john/ Usage: john [OPTIONS] [PASSWORD-FILES] -- single "single crack" mode # simple cracking mode -- wordlist = FILE -- stdin wordlist mode, read words from FILE or stdin # dictionary cracking mode -- rules enable word mangling rules for wordlist MODE -- incremental [= mode] "incremental" MODE [using section mode] # Add cracking MODE -- external = MODE external mode or word filter -- stdout [= LENGTH] just output candidate passwords [cut at LENGTH] -- restore [= NAME] restore an interrupted session [called NAME] -- session = NAME give a new session the NAME -- status [= NAME] print status of a session [called NAME] -- make-charset = FILE make a charset, FILE will be overwritten -- show cracked passwords -- test [= TIME] run tests and benchmarks for TIME seconds each -- users = [-] LOGIN | UID [,...] [do not] load this (these) user (s) only -- groups = [-] GID [,...] load users [not] of this (these) group (s) only -- shells = [-] SHELL [,...] load users with [out] this (these) shell (s) only -- salts = [-] N load salts with [out] at least N passwords only -- save-memory = LEVEL enable memory saving, at LEVEL 1 .. 3 -- node = MIN [-MAX]/TOTAL this node's number range out of TOTAL count -- fork = N fork N processes -- format = NAME force hash type NAME: descrypt/bsdicrypt/md5crypt/bcrypt/LM/AFS/tripcode/dummy

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.