🎯 WEEKLY BRIEF

This week we introduce six new programs for you to start hacking, and getting PAID! 🤑

will be going over a brief introduction to John the Ripper!

  • How to install JTR

  • Single Crack attack

  • Brute force attack

  • Dictionary attack

  • Common hash types

🚀 TOP PROGRAMS TO HACK THIS WEEK

Here are six programs for you to start hacking this week!

Program

Platform

Max Bounty

HackerOne

$50,000

HackerOne

$12,000

BugCrowd

$80,000

BugCrowd

$75,000

BugCrowd

$25,000

HackenProof

$50,000

🛠️ Cool Weekly Tool

John the Ripper

John the Ripper (JTR) is a widely used password auditing and security testing tool used by security professionals, sysadmins, and penetration testers to identify weak passwords in their own systems. 😎

We are going to be doing a very quick and brief intro to familiarize yourself with it.

View the basics of password cracking here

For this tutorial we will be using a Kali-Linux based environment. 🐉

Installation

Kali usually has John installed. Just check.

Ctrl Alt T to open terminal

john --version

If not, simply update and install!

sudo apt update && sudo apt install john

How Does It Work?

John works by taking a file of hashed passwords and attempting to recover the original plaintext using three main modes:

  1. Single Crack: Uses login info with mangling rules.

  2. Incremental : Brute force with character sets.

  3. Wordlist: Tries passwords from a dictionary file.

Create test hash

echo -n "password" | md5sum

Example output : 5f4dcc3b5aa765d61d8327deb882cf99 (copy)

save to a file:

vim hash.txt

5f4dcc3b5aa765d61d8327deb882cf99 (paste)

Shift + ZZ to exit vim

Single Crack

This will use username info, and mangling rules automatically.

Since our file is just a hash with no username inside, it cannot use any username provided in the file.

But its worth trying 😉

john hash.txt

Let John Loose. (Brute Force)

John shall automatically detect the hash type, and begin CRACKING!

john --incremental hash.txt

Now this attack may take a while depending on your computers specs… so lets maybe try a dictionary attack instead?

A Dictionary Attack

A dictionary attack involves using.. well a list of words or common phrases. AKA a wordlist.

Kali will include rockyou.txt, but its compressed. So… UNZIP!

sudo gzip -d /usr/share/wordlists/rockyou.txt.gz

Run That Dictionary Attack

We know the format is going to be MD5, so we will do that using —format=Raw-MD5 then again, john can figure this out on its own.

john --format=Raw-MD5 --wordlist=/usr/share/wordlists/rockyou.txt hash.txt

:0 see that “password (?)” that means john cracked the code!

See Password hash for the file that was cracked.

john --show --format=Raw-MD5 hash.txt

Common Hash Types + Flags

Hash Type

Format Flag

MD5

--format=raw-md5

SHA1

--format=raw-sha1

SHA256

--format=raw-sha256

bcrypt

--format=bcrypt

Subscribe for more opportunities! See you in the next one. :)

Keep Reading