Want to create interactive content? It’s easy in Genially!
Presentation anglais tech Lauret / Sylvestre
William Lauret
Created on February 8, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
John the Ripper and Crunch
Lauret William & Youn Sylvestre
Plan
01
Introduction
02
What Is John the Ripper?
03
How does John work?
04
How is the Command used? (Demo)
05
What is Crunch?
06
How does Crunch work?
07
How are both commands used together?
08
Demo of both commands used together
09
Conclusion
Introduction
01
What is John the Ripper?
- Powerful open-source password cracking tool. - Detects weak passwords by attempting to crack password hashes.
How does John work?
- Supports dictionary attacks, brute-force attacks, and hybrid attacks. Modes: - Dictionary attacks: --wordlist - Brute-force attacks: --incremental - Hybrid attacks: --mask
How is the command used?(Demo)
What is Crunch?
- Tool for generating custom password lists.- Creates wordlists based on specified criteria like length, character sets, and patterns.
How does Crunch work?
Options:
Output:
Generated wordlist can be saved to a file using the -o option.
- Character sets: -t - Patterns: -s - Exclude characters: -exclude
How are both commands used together?
Example 2: Hybrid Attack
Example 1: Custom Wordlist
- Generating Custom Wordlist: Using Crunch to create a tailored wordlist based on potential password patterns and characteristics. - Applying John the Ripper: Utilizing John the Ripper with the generated wordlist to perform a dictionary attack on password hashes.
- Generating Custom Patterns: Using Crunch to create a custom wordlist with specific patterns. - Hybrid Attack with John the Ripper: Applying John the Ripper in hybrid mode, combining dictionary and brute-force attacks with the custom wordlist previously created using Crunch.
Step 3
Demo
Conclusion