Go Back   Xisp.org Forums > Porn Password Cracking > Tools of the Trade

JTR tutor

Reply
Views: 2820 - Replies: 7  
Thread Tools Display Modes

JTR tutor
Old 01-03-2005, 07:04 PM   #1
XRoleX
The MeXicaN
 
XRoleX's Avatar
 
XRoleX is offline Offline
Join Date: Jan 2005
Location: MeXicO
Posts: 318
Threads: 55
XRoleX is on a distinguished road
Default JTR tutor

Posted by MoonDoggy on previous forum

JTR Tuto
1. First, you need to get a copy of your password file. If you got shadow passwords, then (as root):

unshadow /etc/passwd /etc/shadow > passwd.1

or similar should do (replace the filenames as needed, and make sure
that your combined password file isn't readable by others). Otherwise, just:

cp /etc/passwd passwd.1

2. Assume you just got a password file, 'passwd.1', and want to crack
it.The simplest way is to use the default order of cracking modes:

john passwd.1

This will try "single crack" mode first, then use a wordlist with rules,and finally go for incremental mode. Read doc/MODES for more information on these modes.

It is highly recommended that you obtain a larger wordlist, and edit the 'Wordfile =' line in ~/john.ini before running John.

3. Now, you got some passwords cracked, they are saved in ~/john.pot.
You want to retrieve them:

john -show passwd.1

If the account list gets large and doesn't fit on the screen, you can of course, use output redirection.

Now, you may notice that many accounts have a disabled shell, you can
make John ignore these (assume that shell is called '/etc/expired'):

john -show -shells:-/etc/expired passwd.1

or, shorter, but will also match '/any/path/expired':

john -show -shells:-expired passwd.1

or if you also want to ignore some other shell, say '/etc/newuser':

john -show -shells:-expired,newuser passwd.1

(Note: the above syntax has changed since version 1.4 so that it's more logical and shorter to type.)

To check if any root (uid 0) accounts got cracked:

john -show -users:0 passwd.1

or to check for cracked root (uid 0) accounts in all the files:

john -show -users:0 passwd.*

To display the root (login 'root') account only:

john -show -users:root passwd.1

And finally to check for privileged groups:

john -show -groups:0,1 passwd.1

4. You might prefer to manage the cracking modes manually instead. It is wise to start with "single crack" mode:

john -single passwd.1

or since options can be abbreviated (however, I'll be using full names for most options in these examples):

john -si passwd.1

If you have more files to crack, better to load them at the same time:

john -single passwd.1 passwd.2

or even:

john -single passwd.*

5. To catch more complicated (but still weak) passwords, you can use more powerful cracking modes. First, try a wordlist:

john -w:words.lst passwd.1

or you might prefer to use the GNU-style long options syntax, say, to use file name completion in bash:

john --wordfile=words.lst passwd.1

or shorter to type:

john -w=words.lst passwd.1

or with rules enabled (slower, but more powerful; this is what you should use if you're trying to locate almost all the weak passwords):

john -w:words.lst -rules passwd.1

or if you got a lot of spare disk space to trade for performance:

john -w:words.lst -rules -stdout:8 | unique huge.lst
john -w:huge.lst passwd.1

This is going to take some time, so you will probably want to continue cracking or whatever in the background. You can simply disconnect, or close your xterm: John will ignore the SIGHUP and continue running. Alternatively,you might prefer to start it like this, and then logout:

nice -n 20 john -w:words.lst -rules passwd.1 &

Finally, to make John have even less impact on other processes, you might want to set the 'Idle =' option in ~/john.ini.

To only crack accounts with a good shell (in general, the shell, user and group filters described above work for all the cracking modes also):

john -w:words.lst -rules -shells:sh,csh,tcsh,bash passwd.1

Like with all the other cracking modes, faster to crack all the files you need cracked simultaneously:

john -w:words.lst -rules passwd.*

You can crack some passwords only. This will try cracking all root (uid 0) accounts in all the password files:

john -w:words.lst -rules -users:0 passwd.*

Alternatively you may wish not to waste the time cracking your very own passwords, if you're sure they're uncrackable:

john -w:words.lst -rules -users:-root,solar passwd.*

Sometimes it is useful to split your password files into two parts which you crack separately, like:

john -w:words.lst -rules -salts:2 passwd.*
john -w:words.lst -rules -salts:-2 passwd.*

This will make John try salts with two or more passwords faster, and then try the rest. Total cracking time will be about the same, but you will get some passwords cracked earlier, and may not need the rest. Also, you might want to try all the accounts with a small wordlist, and only those that you can try faster (with '-salts:2') with a larger one. Often it is better to use a larger value than 2 for '-salts' (sometimes even as high as 1000 will do, indicating a problem with your password changing program though) adjust it for your particular case.

Note that the default wordlist rules include ':' (which means "try words as they are in the list") as the first line. If you already ran through a wordlist without using rules, and then decided to try the same wordlist with rules also, you'd better comment this line out.

6. The most powerful cracking mode in John is called "incremental" (not a proper name, but kept for historical reasons). You can simply run:

john -i passwd.1

This will use the default incremental mode parameters, which are defined in ~/john.ini's [Incremental:All] section. In the configuration file supplied with John these parameters are to use the full 95 character set and to try all possible password lengths, from 0 to 8. (By zero password length I mean a hashed empty string, this sometimes happens.) Don't expect this to terminate in a reasonable time (unless all the passwords were weak and got cracked), read doc/MODES for an explanation.

In some cases it is faster to use some other pre-defined incremental mode parameters and only crack simpler passwords, from a limited charset. The following command will try 26 different characters only, passwords from 'a' to 'zzzzzzzz':

john -i:alpha passwd.1

Again you can crack root accounts only and use some other John's features with the incremental mode. This command will try cracking all root (uid 0)accounts in all the password files, and only those of them that produce matching salts, so you get at least twice the performance -- if you have a lot of password files (like 100+ of them, named '*.pwd'), otherwise there will probably be no roots with matching salts:

john -i -users:0 -salts:2 *.pwd

7. If you got a password file and already have a lot of passwords cracked or sniffed, and the passwords are unusual, then you might want to generate a new charset file, based on characters from that password file only:

john -makechars:custom.chr passwd.1

Then use that new file for the incremental mode.

If you got many password files from your country, your university, etc,it might be useful to use all of them for the charset file that you then use to crack more passwords in these files, or some other files from the same place:

john -makechars:custom.chr passwd.1 passwd.2
[ Add your custom incremental mode to ~/john.ini now. See below. ]
john -i:custom passwd.3

You can use some pre-defined or custom word filters when generating the charset file, to make it only try some simpler words:

john -makechars:my_alpha.chr -external:filter_alpha passwd.1

If your ~/john.pot file got large enough (or if you don't have any charset files at all), you might want to use it for new main charset files:

john -makechars:all.chr
john -makechars:alpha.chr -external:filter_alpha
john -makechars:digits.chr -external:filter_digits
john -makechars:lanman.chr -external:filter_lanman

In the example above, John will overwrite the charset files with new ones that are based on your entire ~/john.pot (John uses the entire file if you don't specify any password files). Note that the word filters used here are pre-defined in ~/john.ini supplied with John, for your convenience.
__________________
XRoleX
#XxXCrackers

Last edited by sPlico; 01-05-2005 at 08:45 AM..
  Reply With Quote

Old 10-05-2006, 05:50 PM   #2
Inuit
Guest
 
Posts: n/a
Threads: 5107
Default

Many thank's
  Reply With Quote

Old 12-26-2006, 05:49 AM   #3
solidsnakey
Guest
 
Posts: n/a
Threads: 5107
Default

am i doing this wrong or is it taking a long time (like 6 hrs now) to finish?
  Reply With Quote

Old 01-04-2007, 07:12 PM   #4
skyrunner
Guest
 
Posts: n/a
Threads: 5107
Default

nice work many thanks
  Reply With Quote

Old 03-04-2007, 02:28 PM   #5
mwall
Guest
 
Posts: n/a
Threads: 5107
Default

Interesting, I assume the windows version is the same?
  Reply With Quote

Old 09-03-2007, 09:05 PM   #6
thelostdog
Guest
 
Posts: n/a
Threads: 5107
Default

very nice and usefull tut! thanks for the post.
  Reply With Quote

Old 10-14-2007, 04:50 AM   #7
gaxx12
Guest
 
Posts: n/a
Threads: 5107
Default

thanks for the tutorial
  Reply With Quote

Old 10-16-2007, 04:31 AM   #8
chrisn
Guest
 
Posts: n/a
Threads: 5107
Default

nice works, thanks for sharing.
  Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump



All times are GMT -4. The time now is 10:11 PM.


vBulletin skin developed by: Xisp.org Crew
Powered by vBulletin®
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.
2005 Copyright Xisp.org