John the Ripper BruteForce Attack

Discussion in 'Resources' started by ALF19888, 25 Aug 2012.

  1. ALF19888

    ALF19888 Well-Known Member

    Joined:
    19 Aug 2012
    Messages:
    23
    Likes Received:
    15
    Trophy Points:
    58
    The Demonstration is for EDUCATIONAL PURPOSE ONLY!!!

    John the Ripper is a fast password cracker that is available for Unix, Windows, DOS, and OpenVMS. John the Ripper can and will detect weak Unix passwords. That was the original purpose of the application from the start where it was very successful. There is no pro versions available for Mac OSX & Linux with 64 Bit and wider range of password support. This can be downloaded here: http://www.openwall.com/john/

    John the Ripper is available for Mac here http://www.openwall.com/john/pro/macosx/

    Brute Force attacks may have a dictionary of all words or a listing of commonly used passwords. It is basically known as the trial and error method. Brute Force attacks use all possible combinations of legal characters in sequence. This attack is considered to be an infallible approach, but yet very time-consuming. The cracking of a password with this approach could take seconds, minuets, hours, or days. Bottom line it can take a lifetime.

    Watch this video on YouTube.
     
    • Like Like x 1
  2. N0iZE

    N0iZE Mod
    Staff Member Moderator

    Joined:
    1 Aug 2012
    Messages:
    79
    Likes Received:
    7
    Trophy Points:
    130
    how to install on backtrack vmware?
     
  3. ALF19888

    ALF19888 Well-Known Member

    Joined:
    19 Aug 2012
    Messages:
    23
    Likes Received:
    15
    Trophy Points:
    58
    You can install Backtrack with this video.

    Watch this video on YouTube.
     
  4. N0iZE

    N0iZE Mod
    Staff Member Moderator

    Joined:
    1 Aug 2012
    Messages:
    79
    Likes Received:
    7
    Trophy Points:
    130
    i em
    I have backtrack. how do i install john the ripper ON Backtrack? :)
     
  5. ALF19888

    ALF19888 Well-Known Member

    Joined:
    19 Aug 2012
    Messages:
    23
    Likes Received:
    15
    Trophy Points:
    58
    John the Ripper is on backtrack by default
     
  6. Mr. Penguin

    Mr. Penguin Administrator
    Staff Member Admin Moderator VIP

    Joined:
    18 May 2012
    Messages:
    3,085
    Likes Received:
    1,186
    Trophy Points:
    351
  7. vampiricbunny1800

    vampiricbunny1800 Well-Known Member
    Dev Team VIP

    Joined:
    8 Oct 2012
    Messages:
    242
    Likes Received:
    64
    Trophy Points:
    63
    i have always had issues with this program i am not sure why it just does not like me i am currently looking for some awsome .dic files and wordlist i had a 80 gig one and lost it >< now i cant find the site again lol
     
  8. ImJoJo

    ImJoJo The One & Only
    VIP

    Joined:
    25 Jun 2012
    Messages:
    246
    Likes Received:
    107
    Trophy Points:
    191
    Have tried using Crunch in Backtrack? You can create your own custom wordlist depending on the knowledge you have on specific AP's. (e.g. TimeWarner Cable) in United States uses your phone # as your WPA2 PSK key and always on channel 1. Also they use the same vendor so you can check out the MAC here http://www.macvendorlookup.com/ So if your area code is 818, create a wordlist starting with 818 and the rest random numbers..You will increase your odds and definitely your cracking time. Believe me, I know. so ALWAYS do your homework first. Why use words that you know are not gonna be there or a language other than what is spoken in your area.
    Also try to use a bit of Social Engineering skills... :eek:
     
  9. vampiricbunny1800

    vampiricbunny1800 Well-Known Member
    Dev Team VIP

    Joined:
    8 Oct 2012
    Messages:
    242
    Likes Received:
    64
    Trophy Points:
    63
    no i just got back track and i am brand new to the program i have used it about a week now for what i have had about 3 of practice...
    ya i have my own dic files about 120 gigs of them id like to get them into a faster file tho i heard about putting it into hash on hack 5 . i was wondering if there is a step by step walk though?
     
  10. Mr. Penguin

    Mr. Penguin Administrator
    Staff Member Admin Moderator VIP

    Joined:
    18 May 2012
    Messages:
    3,085
    Likes Received:
    1,186
    Trophy Points:
    351
    debugging test​
     
Loading...
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.


    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K