Want to create interactive content? It’s easy in Genially!

Get started free

Presentation anglais tech Lauret / Sylvestre

William Lauret

Created on February 8, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

John the Ripper and Crunch

Lauret William & Youn Sylvestre

Plan

01

Introduction

02

What Is John the Ripper?

03

How does John work?

04

How is the Command used? (Demo)

05

What is Crunch?

06

How does Crunch work?

07

How are both commands used together?

08

Demo of both commands used together

09

Conclusion

Introduction

01

What is John the Ripper?

- Powerful open-source password cracking tool. - Detects weak passwords by attempting to crack password hashes.

How does John work?

- Supports dictionary attacks, brute-force attacks, and hybrid attacks. Modes: - Dictionary attacks: --wordlist - Brute-force attacks: --incremental - Hybrid attacks: --mask

How is the command used?(Demo)

What is Crunch?

- Tool for generating custom password lists.- Creates wordlists based on specified criteria like length, character sets, and patterns.

How does Crunch work?

Options:

Output:

Generated wordlist can be saved to a file using the -o option.

- Character sets: -t - Patterns: -s - Exclude characters: -exclude

How are both commands used together?

Example 2: Hybrid Attack

Example 1: Custom Wordlist

- Generating Custom Wordlist: Using Crunch to create a tailored wordlist based on potential password patterns and characteristics. - Applying John the Ripper: Utilizing John the Ripper with the generated wordlist to perform a dictionary attack on password hashes.

- Generating Custom Patterns: Using Crunch to create a custom wordlist with specific patterns. - Hybrid Attack with John the Ripper: Applying John the Ripper in hybrid mode, combining dictionary and brute-force attacks with the custom wordlist previously created using Crunch.

Step 3

Demo

Conclusion