Want to make creations as awesome as this one?

Transcript

Lauret William & Youn Sylvestre

John the Ripper and Crunch

How are both commands used together?

07

How does John work?

03

What Is John the Ripper?

02

Introduction

01

Conclusion

09

Demo of both commands used together

08

How does Crunch work?

06

What is Crunch?

05

How is the Command used? (Demo)

04

Plan

01

Introduction

- Powerful open-source password cracking tool. - Detects weak passwords by attempting to crack password hashes.

What is John the Ripper?

- Supports dictionary attacks, brute-force attacks, and hybrid attacks.Modes:- Dictionary attacks: --wordlist- Brute-force attacks: --incremental- Hybrid attacks: --mask

How does John work?

How is the command used?(Demo)

- Tool for generating custom password lists.- Creates wordlists based on specified criteria like length, character sets, and patterns.

What is Crunch?

Output:

Generated wordlist can be saved to a file using the -o option.

Options:

- Character sets: -t - Patterns: -s - Exclude characters: -exclude

How does Crunch work?

- Generating Custom Patterns: Using Crunch to create a custom wordlist with specific patterns.- Hybrid Attack with John the Ripper: Applying John the Ripper in hybrid mode, combining dictionary and brute-force attacks with the custom wordlist previously created using Crunch.

- Generating Custom Wordlist: Using Crunch to create a tailored wordlist based on potential password patterns and characteristics.- Applying John the Ripper: Utilizing John the Ripper with the generated wordlist to perform a dictionary attack on password hashes.

Step 3

Example 2: Hybrid Attack

Example 1: Custom Wordlist

How are both commands used together?

Demo

Conclusion