Want to create interactive content? It’s easy in Genially!
Presentation anglais tech Lauret / Sylvestre
William Lauret
Created on February 8, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
Lauret William & Youn Sylvestre
John the Ripper and Crunch
How are both commands used together?
07
How does John work?
03
What Is John the Ripper?
02
Introduction
01
Conclusion
09
Demo of both commands used together
08
How does Crunch work?
06
What is Crunch?
05
How is the Command used? (Demo)
04
Plan
01
Introduction
- Powerful open-source password cracking tool. - Detects weak passwords by attempting to crack password hashes.
What is John the Ripper?
- Supports dictionary attacks, brute-force attacks, and hybrid attacks. Modes: - Dictionary attacks: --wordlist - Brute-force attacks: --incremental - Hybrid attacks: --mask
How does John work?
How is the command used?(Demo)
- Tool for generating custom password lists.- Creates wordlists based on specified criteria like length, character sets, and patterns.
What is Crunch?
Output:
Generated wordlist can be saved to a file using the -o option.
Options:
- Character sets: -t - Patterns: -s - Exclude characters: -exclude
How does Crunch work?
- Generating Custom Patterns: Using Crunch to create a custom wordlist with specific patterns. - Hybrid Attack with John the Ripper: Applying John the Ripper in hybrid mode, combining dictionary and brute-force attacks with the custom wordlist previously created using Crunch.
- Generating Custom Wordlist: Using Crunch to create a tailored wordlist based on potential password patterns and characteristics. - Applying John the Ripper: Utilizing John the Ripper with the generated wordlist to perform a dictionary attack on password hashes.
Step 3
Example 2: Hybrid Attack
Example 1: Custom Wordlist
How are both commands used together?
Demo
Conclusion