John the Ripper help | Unix Linux Forums | UNIX and Linux Applications

  Go Back    


UNIX and Linux Applications Discuss UNIX and Linux software applications. This includes SQL, Databases, Middleware, MOM, SOA, EDA, CEP, BI, BPM and similar topics.

John the Ripper help

UNIX and Linux Applications


Closed Thread    
 
Thread Tools Search this Thread Display Modes
    #1  
Old 11-01-2011
Gameover Gameover is offline
Registered User
 
Join Date: Nov 2011
Last Activity: 29 December 2011, 1:09 PM EST
Posts: 8
Thanks: 0
Thanked 0 Times in 0 Posts
John the Ripper help

I am trying to figure out JTR, I am trying to break a password

What I am trying to get to work is the "mangle" option. I've tried it a few times and it doesn't work. I have been able to get JTR working using other options and syntaxes.

What I need to see so I can understand it is how to write the syntax

Here's what I've tried already:

john --mywordlist.txt=mangle --rules -stdout

I don't know where to put the "mangle" part of the command and if there is supposed to be the "=" or what. Am I supposed to use the wordlist I have to break the password along with the "mangle"

I am a newbie and tried a few things as well as looking on youtube for videos but all of those have an understanding that the people using are expereinced whereas I am not experienced in it at all.

Dumb it down for me... lol.
Sponsored Links
    #2  
Old 11-01-2011
cjcox cjcox is offline
Registered User
 
Join Date: May 2005
Last Activity: 29 July 2014, 11:20 AM EDT
Posts: 367
Thanks: 2
Thanked 37 Times in 35 Posts
Well.. actually, you just use a wordlist... but you can use john the ripper rules to produce a mangled wordlist for you:


Code:
john --wordlist=all.lst --rules --stdout=8 | unique mangled8.lst
john --wordlist=mangled8.lst mypasswd

I took that STRAIGHT from the docs... the first command takes a normal word list that you supply called all.lst and mangles it constraining it to 8 char passwords and stores unique mangled passwords to the file mangled8.lst and then the second one is where you are using that new managled list of words to go against some passwords.
Sponsored Links
    #3  
Old 11-02-2011
Gameover Gameover is offline
Registered User
 
Join Date: Nov 2011
Last Activity: 29 December 2011, 1:09 PM EST
Posts: 8
Thanks: 0
Thanked 0 Times in 0 Posts
Thanks for the response. I tried that and you nailed it right on the head. It worked, well let me rephrase that. The cmd you gave me worked. But not my overall goal.

Looking now to brute force it now. Any way JTR does this and and the cmd is uses to execute it?
    #4  
Old 11-03-2011
cjcox cjcox is offline
Registered User
 
Join Date: May 2005
Last Activity: 29 July 2014, 11:20 AM EDT
Posts: 367
Thanks: 2
Thanked 37 Times in 35 Posts
Just download the source and look through the rules.c file.

I general, when breaking a password, you have your "word list" which is what will be used in addition to "the rules" to make stabs a brute forcing a password (populate the word list with things that YOU believe might be there as well). A good 8 character password using salted DES (aka DES-crypt) could take a lot of machine resources (time) to brute force btw... and that's one of the easier cases. Non-salted things work better of course, but good systems will likely have salt for hashes anyhow.

What type of hash are you trying to brute force? If it's non-salted, there are prebuilt tables (rainbow tables) out there for some of the "harder" hash types.... but again, if this is a Linux/Unix style hash, it will be salted... in which case, it will take some serious time to brute force (unless you make some lucky guesses.. easily guessed password types).
Sponsored Links
    #5  
Old 11-03-2011
Gameover Gameover is offline
Registered User
 
Join Date: Nov 2011
Last Activity: 29 December 2011, 1:09 PM EST
Posts: 8
Thanks: 0
Thanked 0 Times in 0 Posts
Well I am a beginner at this stuff but my friend is a System Admin, a position that I am trying to get one day. He told me about backtrac and gave me his copy and then challenged me to see if I can get the "root" password. He's been doing this for a long time and did a pretty good job of hiding everything that I can find that can give me root access.

So all the stuff I see on you tube about getting root access he has already done and hidden the stuff or deleted it all together. That's where I am having a hard time getting stuff.

Here's what I've done so far. I've done OS fingerprinting, Mapped the network, did some banner grabbing, check for open ports. I've had some success but not much.

some of the things I've found online to do this like
unshadow /etc/passwd /etc/shadow > don't work.

Is there any way I can just do a Brute force attack without a password list? I've run 6 dictionaries through JTR as well as Hydra and neither have hit a thing. So just doing a brute force may work. Takes time but I have time on my side. Let me know if you can help.
.
Sponsored Links
    #6  
Old 11-04-2011
jim mcnamara jim mcnamara is offline Forum Staff  
...@...
 
Join Date: Feb 2004
Last Activity: 31 July 2014, 11:11 AM EDT
Location: NM
Posts: 10,160
Thanks: 269
Thanked 781 Times in 731 Posts
You cannot just boot into single user mode? Or boot from CD? I don't get what's really going on here.

I will leave this open for now, but UNIX.com is not a hacker site. Period.
Sponsored Links
    #7  
Old 11-04-2011
Corona688 Corona688 is offline Forum Staff  
Mead Rotor
 
Join Date: Aug 2005
Last Activity: 31 July 2014, 7:13 PM EDT
Location: Saskatchewan
Posts: 19,041
Thanks: 756
Thanked 3,164 Times in 2,968 Posts
Of course you can't read the shadow file if you don't have root already..
Sponsored Links
Closed Thread

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

More UNIX and Linux Forum Topics You Might Find Helpful
Thread Thread Starter Forum Replies Last Post
John the ripper bander2009 Security 5 07-18-2010 06:02 AM
John the Ripper / CRACK stevej123 Red Hat 1 01-13-2010 02:54 PM
John the Ripper application question itsjoy2u UNIX and Linux Applications 4 12-11-2009 05:22 AM



All times are GMT -4. The time now is 09:40 PM.