Lab-3: Cracking password with John
Once you do that run the following command to get the wordlists from the web in the terminal
wget https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt
You should have the following files in your unti3 folder.
codepath@lab000001:~/unit3$ ls
crackfiles.zip rockyou.txt cp_leak.txt
Run the following command: less -N ./rockyou.txt and you should see a big word list showing up. You can search for a word using & and look up its form such as &puppy.
Now, it seems that this word list is ok. Let's try to crack passwords
For crackA.txt,run the following command john –single crackA.txt and you should be able to crack the passwords.
9. For crackB txt, run john –wordlist=lower.lst crackB.txt to crack Jim's password, john –wordlist=lower.lst crackB.txt –rules=l33t to crack Dwight's password, and john –wordlist=lower.lst crackB.txt –rules=shifttoggle
to crack Pam's password.
For crackC.txt, we can run john –incremental=digits –min-length=4 –max-length=6 crackC.txt to crack pinball's passwords, john –mask=?d?u?l?l crackC.txt to crack pacman's passwords, and john –mask=?l?l?l?l?d! crackC.txt to crack frogger's password.
You can see your passwords in using ~~/snap/john-the-ripper/610/.john/john.pot command and use less to see the passwords you cracked.