You are on page 1of 10

CBTU presents Ethical Hacker training course based on

by

Module 5: System hacking


Section 5.18: John the Ripper – password cracker

Note: All the logos, trademarks are copyrights of the respective companies. CEH is the trademark of EC-Council (www.eccouncil.org).
Caution: Ethical Hacker course is for educational purpose only and NOT to be used for unethical, illegal and malicious
activities. All over the world Cyber Laws enforce strict punishments for violation of ethics, gaining unauthorized access to
any computer system/network and related illegal activities.
John the Ripper
John the Ripper is a password cracking software tool
that combines number of password crackers into one
package, auto detects password hash types, and
includes a customizable cracker.
John the Ripper is free and Open Source software,
distributed primarily in source code form.
It can be run against various Unix crypt password hash
types (DES, MD5, or Blowfish), Kerberos AFS, and
Windows LM hash.
John - features
John the Ripper is a fast password cracker.
– Its primary purpose is to detect weak Unix passwords,
besides several crypt password hash types, Windows
LM hashes, other hashes and ciphers.
– It is supported on multi platforms (Unix, DOS, Win32,
BeOS, and OpenVMS).
John – pro versions
John the Ripper Pro is a commercial product tailored for
your specific operating system, which is distributed in the
form of "native" packages for the target OS for easy
install and use.
John the Ripper Pro is available for
– Linux, Mac OS X, Hash suite (for Windows), Hash Suite
Droid (for android)
Attack types
Dictionary attack:
– It takes text string samples (from a file, called a
wordlist, containing words found in a dictionary or
real passwords cracked before), encrypting it in
the same format as the password being examined
and comparing the output to the encrypted string.
John – brute-force
John also offers a brute-force mode. In this type of
attack, the program goes through all the possible
plaintexts, hashing each one and then comparing it
to the input hash.
John uses character frequency tables to try plaintexts
containing more frequently used characters first.
Thanks for watching
Visit us at: CBTUniversity.com
Write to us at: learnq@cbtuniversity.com
Reach us at:  +91 963 246 5599

You might also like