Cracking password hashes
In this recipe, we are to see how we can crack the hashes for a clear-text password. We will be using John the Ripper. John the Ripper (JTR) is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt (3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version.
Getting ready
We will require the hash obtained on the Windows machine to be ported to our Kali machine, after which we can commence with a comparison of the hashes.
How to do it...
- Let us begin with one of the most efficient tools when it comes to cracking passwords, JTR. For the given example, we have taken the hash dump received previously. The file has been renamed
crackme
for ease of readability. - Enter the following command in the terminal:
john crackme
The output...