

So to crack it, we simply type: john /etc/shadow. The linux user password is saved in /etc/shadow folder. Cracking Linux User Password 2.Cracking Password Protected ZIP/RAR Files 3.Decrypting MD5 Hash 4.Using Wordlists To Crack Passwords Lets begin. If you’re not sure how, follow the steps in the study guide to do so. Launch a terminal within a Linux operating system. This lab demonstrates how John the Ripper uses a dictionary to crack passwords for Linux accounts. One of the methods of cracking a password is using a dictionary, or file filled with words. Most of these packages employ a mixture of cracking strategies, algorithm with brute force and dictionary attacks proving to be the most productive. Now we have those to hand we can explore other vulnerabilities we can exploit.There are many password cracking software tools, but the most popular are Aircrack, Cain and Abel, John the Ripper, Hashcat, Hydra, DaveGrohl and ElcomSoft.Many litigation support software packages also include password cracking functionality. Some of these services will require us to enter username and passwords in order to exploit. Now we have the passwords, there are other services we have seen running on our Metasploitable machine that could be vulnerable. The vulnerable unrealIRC that was exploited. If you followed this tutorial from the previous, you will see that we were able to gain root access, grab the hashes, and crack them all because of one security hole. If someone is running a dictionary attack to try and crack the password the likelihood of a random string combination being in the dictionary is far less than using an actual word. Combine it with upper and lower cases, special characters. Use some kind of random password for strong security. So what did we learn from this tutorial? Well, it’s important to secure your system. There are some huge dictionaries available online for download that contain many potential and common passwords. Of course if the password you are trying to crack doesn’t exist in your dictionary, it will fine no results. If you run the crack command again, it will continue trying to crack the remaining 3. You can see we have 4 cracked and 3 pending. This will show us what has been cracked already and what is pending. Sudo john /home/kali/Desktop/passwords.db -show
