Skip to Content
๐Ÿ“ Notes๐Ÿ”’ SecurityBusterHash[Hash] john

[Hash] john

A tools for crack through brute force hashed passwords

Basic usage

Create a file call hash in current dir.
Then input the hash that we want to burse.

5f4dcc3b5aa765d61d8327deb882cf99 e99a18c428cb38d5f260853678922e03

Notices: You may want to use hash-identifier to know the hash format first.

Last, using following code to bash.

  • With raw-md5 / md5
john --wordlist=/usr/share/john/password.lst --format=raw-md5 ./hash
  • With raw-sha1
john --wordlist=/usr/share/wordlists/rockyou.txt --format=raw-sha1 ./hash
  • With whirlpool
john --wordlist=/usr/share/wordlists/rockyou.txt --format=whirlpool ./hash

https://bcrypt-generator.com/ย 

  • With bcrypt
john --wordlist=/usr/share/wordlists/rockyou.txt --format=bcrypt ./hash

Avaiable format

john --list=formats | grep -i 'md5' descrypt, bsdicrypt, md5crypt, md5crypt-long, bcrypt, scrypt, LM, AFS, aix-ssha512, andOTP, ansible, argon2, as400-des, as400-ssha1, asa-md5, dahua, dashlane, diskcryptor, Django, django-scrypt, dmd5, dmg, dominosec, mschapv2-naive, krb5pa-md5, mssql, mssql05, mssql12, multibit, mysqlna, mysql-sha1, mysql, net-ah, nethalflm, netlm, netlmv2, net-md5, netntlmv2, netntlm, netntlm-naive, net-sha1, nk, notes, md5ns, nsec3, NT, o10glogon, PBKDF2-HMAC-MD4, PBKDF2-HMAC-MD5, PBKDF2-HMAC-SHA1, PBKDF2-HMAC-SHA256, PHPS2, pix-md5, PKZIP, po, postgres, PST, PuTTY, pwsafe, qnx, RACF, Raw-Keccak, Raw-Keccak-256, Raw-MD4, Raw-MD5, Raw-MD5u, Raw-SHA1, Stribog-256, Stribog-512, STRIP, SunMD5, SybaseASE, Sybase-PROP, tacacs-plus, tcp-md5, telegram, tezos, Tiger, tc_aes_xts, tc_ripemd160, tc_ripemd160boot, ZipMonster, plaintext, has-160, HMAC-MD5, HMAC-SHA1, HMAC-SHA224

unshadow and decode for linux passowrd crack

  • FILE 1 - local_passwd
    Contains the /etc/passwd line for the root user:
    root:x:0:0::/root:/bin/bash

  • FILE 2 - local_shadow
    Contains the /etc/shadow line for the root user:
    root:$6$2nwjN454g.dv4HN/$m9Z/r2xVfweYVkrr.v5Ft8Ws3/YYksfNwq96UL1FX0OJjY1L6l.DS3KEVsZ9rOVLB/ldTeEL/OIhJZ4GMFMGA0:18576::::::

unshadow local_passwd local_shadow > unshadowed.txt

Then feed the file to john for crack the password.

john --wordlist=/usr/share/wordlists/rockyou.txt --format=sha512crypt unshadowed.txt

single crack mode

If youโ€™re cracking hashes in single crack mode, you need to change the file format that youโ€™re feeding john for it to understand what data to create a wordlist from.

From:
1efee03cdcb96d90ad48ccc7b8666033
To
mike:1efee03cdcb96d90ad48ccc7b8666033

john --single --format=raw-sha256 hash7.txt

Crack zip / rar / ssh with pw

The following utils are used to extract password hash from the regarding file type:

  • zip
zip2john zipfile.zip > zip_hash.txt
  • rar
rar2john rarfile.rar > rar_hash.txt
  • ssh
ssh2john id_rsa > id_rsa_hash.txt
office2john someXlsx.xlsx > id_rsa_hash.txt

Then using join to crack. Filename change to the hash file.

john --wordlist=/usr/share/wordlists/rockyou.txt zip_hash.txt
Last updated on