Try   HackMD

Lab-3: Cracking password with John

  1. Once you connect to your VM using RDP or SSH, and run the ssudo apt-get purge john -y && sudo snap install john-the-ripper && sudo reboot command in you VM.
  2. Your VM will be closed but you cna re-establish you session via ssh and RDp to access the VM.
  3. Next, go ahead and unzip the folder (you can use the unzip command) and take a look at the files (using ls). You should have:
  • crackA.txt
  • crackB.txt
  • crackC.txt
  • crackChallenge.txt
  • lower.lst
  1. Once you do that run the following command to get the wordlists from the web in the terminal
    wget https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt

  2. You should have the following files in your unti3 folder.

    codepath@lab000001:~/unit3$ ls
    crackfiles.zip rockyou.txt cp_leak.txt

  3. Run the following command: less -N ./rockyou.txt and you should see a big word list showing up. You can search for a word using & and look up its form such as &puppy.

  4. Now, it seems that this word list is ok. Let's try to crack passwords

  5. For crackA.txt,run the following command john single crackA.txt and you should be able to crack the passwords.


9. For crackB txt, run john wordlist=lower.lst crackB.txt to crack Jim's password, john wordlist=lower.lst crackB.txt rules=l33t to crack Dwight's password, and john wordlist=lower.lst crackB.txt rules=shifttoggle
to crack Pam's password.

  1. For crackC.txt, we can run john incremental=digits min-length=4 max-length=6 crackC.txt to crack pinball's passwords, john mask=?d?u?l?l crackC.txt to crack pacman's passwords, and john mask=?l?l?l?l?d! crackC.txt to crack frogger's password.

  2. You can see your passwords in using ~~/snap/john-the-ripper/610/.john/john.pot command and use less to see the passwords you cracked.