John the Ripper application question

 
Thread Tools Search this Thread
Special Forums UNIX and Linux Applications John the Ripper application question
# 1  
Old 12-09-2009
John the Ripper application question

Hi Friends

I like to know one thing the how exactly john the ripper works. I have search in google, read lots of tutorial on that.

I have simple question, can I get the password for the encrypted file for the following example.

e.g :

Abc.txt file

contents

"This is Joy"

Now I have encrypted the file using gpg and the password is 123.

I got the file Abc.txt.gpg.

Can I get the password using john the ripper while passing Abc.txt.gpg as input?

Thanks in Advance.

Joy
# 2  
Old 12-09-2009
Short answer: No

Long answer: Let's delve into the cryptographic stuff behind UNIX passwords, GPG, and JtC.
UNIX authentication systems never save the passwords themselves in any form, not even encrypted, but instead use a hash of the password. A hash is similar to a compression function. It takes an array of bytes (say, the letters of a password) and mangles them into a fixed length array. The idea is that a small change in the original text yields a big change in the hash, and that by hashing 2 identical texts you get the same hash. If a user wants to authenticate, the password entered is hashed, and the hash is compared to the one saved.
Since hashing means you loose information, hashes will never be collision free. To prevent 2 users accidentally having the same password hash, salts were introduced. Those are random bits prepended to the password, so that even if two users has the same password, their hashes wouldn't match up.
The biggest difference between hashing and encryption functions is that hashes are very fast.

Encryption, OTOH, takes the input message (your text file) and a key (created from your password), and sends both through an encryption function like AES. Contrary to hashes, the result usually isn't shorter than the original, but it's getting transformed, and it's recoverable while hashes are not. Also, encryption schemes usually are very resilient against attacks. For example, with AES it's still impossible to recover the key in a know-plaintext attack (meaning: you have both the original text and the encrypted text, and it's still impossible to find out the key/password used as to decrypt other messages).

John the Ripper (JtR) uses the speed of hashes to its advantage. A dictionary attack is very fast, even against salted password hashes, and even faster again NTLM passwords. But it can only attack hashes, since they're pretty fixed in their parameters, while for encryption there are a lot of variables, such as key length, algorithm used, and which block mode is being used (CBC/CFB/CTR/...)
# 3  
Old 12-09-2009
I have never used this application, but just reading the docs tells me that the answer is no. This is a password cracker that uses brute force to decrypt a password from a file, eg the passwd file in unix. It doesn't break or recover a password used to encrypt a file itself.
# 4  
Old 12-09-2009
Quote:
Originally Posted by itsjoy2u
Can I get the password using john the ripper while passing Abc.txt.gpg as input?
In such a very simple example, why not try it yourself and post back here with your test results?
# 5  
Old 12-11-2009
Quote:
Originally Posted by Neo
In such a very simple example, why not try it yourself and post back here with your test results?

I have a encrypted file by gpg application, I want to decrypt the file with out the password, using john the ripper. If you think this is very easy, then please provide the steps.

I think every one except you told that it is not possible.

Thanks
Joy

---------- Post updated at 05:22 AM ---------- Previous update was at 05:14 AM ----------

Is there any way to decrypt one file with out knowing the password, provided the its encrypted using gpg application.

Thanks for reply

Joy
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. Cybersecurity

John the ripper

Hi evryone, I have problem the john program. It works correctly but I can not make unshadow command because I have removed the file /usr/bin/john by mistake # cd ../run # ./john /root/shadow Loaded 2 password hashes with 2 different salts (FreeBSD MD5 ) letmein (root) letmein ... (5 Replies)
Discussion started by: bander2009
5 Replies

2. Red Hat

John the Ripper / CRACK

Has anyone used JTR or CRACK to check if you have any weak passwords on your Red Hat Servers? If so can I ask some basic questions? Or would this question be better pitched in another area of the Forum, if so please suggest where, if anyone is willing to help me in this forum please let me know... (1 Reply)
Discussion started by: stevej123
1 Replies

3. UNIX for Dummies Questions & Answers

sudo: application install question

I need to install an application on my Sun station and need root privleges to do so. I was given sudo privileges and was told to issue the following command. bash-2.03$ sudo init 0 I've read the man pages for init and understand the purpose of that command. My questions are: 1. From the... (2 Replies)
Discussion started by: forbin24
2 Replies
Login or Register to Ask a Question