John the Ripper BruteForce Attack

Discussion in 'Resources' started by ALF19888, 25 Aug 2012.

  1. ALF19888

    ALF19888 Well-Known Member

    Joined:
    19 Aug 2012
    Messages:
    23
    Likes Received:
    15
    The Demonstration is for EDUCATIONAL PURPOSE ONLY!!!

    John the Ripper is a fast password cracker that is available for Unix, Windows, DOS, and OpenVMS. John the Ripper can and will detect weak Unix passwords. That was the original purpose of the application from the start where it was very successful. There is no pro versions available for Mac OSX & Linux with 64 Bit and wider range of password support. This can be downloaded here: http://www.openwall.com/john/

    John the Ripper is available for Mac here http://www.openwall.com/john/pro/macosx/

    Brute Force attacks may have a dictionary of all words or a listing of commonly used passwords. It is basically known as the trial and error method. Brute Force attacks use all possible combinations of legal characters in sequence. This attack is considered to be an infallible approach, but yet very time-consuming. The cracking of a password with this approach could take seconds, minuets, hours, or days. Bottom line it can take a lifetime.

    Watch this video on YouTube.
     
    • Like Like x 1
  2. N0iZE

    N0iZE Mod
    Moderator

    Joined:
    1 Aug 2012
    Messages:
    79
    Likes Received:
    8
    how to install on backtrack vmware?
     
  3. ALF19888

    ALF19888 Well-Known Member

    Joined:
    19 Aug 2012
    Messages:
    23
    Likes Received:
    15
    You can install Backtrack with this video.

    Watch this video on YouTube.
     
  4. N0iZE

    N0iZE Mod
    Moderator

    Joined:
    1 Aug 2012
    Messages:
    79
    Likes Received:
    8
    i em
    I have backtrack. how do i install john the ripper ON Backtrack? :)
     
  5. ALF19888

    ALF19888 Well-Known Member

    Joined:
    19 Aug 2012
    Messages:
    23
    Likes Received:
    15
    John the Ripper is on backtrack by default
     
  6. Mr. Penguin

    Mr. Penguin Administrator
    Staff Member VIP Admin

    Joined:
    18 May 2012
    Messages:
    3,093
    Likes Received:
    1,262
  7. vampiricbunny1800

    vampiricbunny1800 Well-Known Member
    Dev Team VIP

    Joined:
    8 Oct 2012
    Messages:
    242
    Likes Received:
    69
    i have always had issues with this program i am not sure why it just does not like me i am currently looking for some awsome .dic files and wordlist i had a 80 gig one and lost it >< now i cant find the site again lol
     
  8. ImJoJo

    ImJoJo The One & Only
    VIP

    Joined:
    25 Jun 2012
    Messages:
    257
    Likes Received:
    121
    Have tried using Crunch in Backtrack? You can create your own custom wordlist depending on the knowledge you have on specific AP's. (e.g. TimeWarner Cable) in United States uses your phone # as your WPA2 PSK key and always on channel 1. Also they use the same vendor so you can check out the MAC here http://www.macvendorlookup.com/ So if your area code is 818, create a wordlist starting with 818 and the rest random numbers..You will increase your odds and definitely your cracking time. Believe me, I know. so ALWAYS do your homework first. Why use words that you know are not gonna be there or a language other than what is spoken in your area.
    Also try to use a bit of Social Engineering skills... :eek:
     
  9. vampiricbunny1800

    vampiricbunny1800 Well-Known Member
    Dev Team VIP

    Joined:
    8 Oct 2012
    Messages:
    242
    Likes Received:
    69
    no i just got back track and i am brand new to the program i have used it about a week now for what i have had about 3 of practice...
    ya i have my own dic files about 120 gigs of them id like to get them into a faster file tho i heard about putting it into hash on hack 5 . i was wondering if there is a step by step walk though?
     
  10. Mr. Penguin

    Mr. Penguin Administrator
    Staff Member VIP Admin

    Joined:
    18 May 2012
    Messages:
    3,093
    Likes Received:
    1,262
    debugging test​
     

Share This Page

Loading...