0% found this document useful (0 votes)
97 views9 pages

Password Cracking Powerpoint

Password cracking is the process of recovering encrypted passwords by trying different combinations. Common password cracking tools like Crack and John the Ripper work through dictionaries of common passwords and combinations of letters, numbers, and symbols to decrypt passwords. The author used John the Ripper on a Windows machine and was able to crack 5 passwords over 3 attempts, with simpler passwords cracking instantly and more complex ones taking up to 4 days.

Uploaded by

Gaurav Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views9 pages

Password Cracking Powerpoint

Password cracking is the process of recovering encrypted passwords by trying different combinations. Common password cracking tools like Crack and John the Ripper work through dictionaries of common passwords and combinations of letters, numbers, and symbols to decrypt passwords. The author used John the Ripper on a Windows machine and was able to crack 5 passwords over 3 attempts, with simpler passwords cracking instantly and more complex ones taking up to 4 days.

Uploaded by

Gaurav Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 9

Password

Cracking
By
Akshaan J Raj
190105181008
TE CSF
Cyber Law
Definition
 Password cracking is one of the oldest hacking arts.
Every system must store passwords somewhere in order
to authenticate users. However, in order to protect
these passwords from being stolen, they are encrypted.
Password cracking is the art of decrypting the passwords
in order to recover them.
What a program
can do
 A password cracking program if used ethically can be
used by the system administrator to detect weak
passwords amongst the system so they can be changed.
A password Cracking program is most likely used to
check the security of you’re your own system
Crack
 Crack is a type of password cracking utility that runs
through combinations of passwords until it finds one
that it matches. It also scans the content of a password
file looking for weak login passwords.
John the Ripper
 John the Ripper is a fast password cracker, currently
available for many flavors of Unix (11 are officially
supported, not counting different architectures), DOS,
Win32, BeOS, and OpenVMS. Its primary purpose is to
detect weak Unix passwords. (openfirewall.com)
John the
Ripper
 In order to run John the Ripper, we went to a site
and downloaded the documents for windows that
gave instructions on how to run it. (this included
the password file, and other documents about
john)
 To run John, we did the following:
Start >Accessories>Windows Explorer>My
computer>John>
 In the command prompt, we typed:
– cd c:\John\john171w\john1701\run
-dir
-john386pass
 This invoked John
Stages
 Though there are different types of password
cracking utilities, most of these go through the
same types of stages when trying to crack
passwords:
 -tries common passwords, such as "password" or
the name of the account in question
 -runs through all the words in the dictionary and
lists of common passwords.
 -runs through all the words in foreign dictionaries
and special "crack" dictionaries.
 -tries all combinations of letters out to a certain
size, such as 5 letters.
 -tries all combinations of letters, upper/lower
case, numbers, and punctuation out to a certain
size, such as 3 characters
Our Results
 We used the program John the Ripper on a windows
machine, using the command prompt
 We ran it 3 times, the first time 3 passwords were
cracked, the second time none, and the third time two
were cracked
 The simplest passwords were cracked instantly (i.e.:
same password as username, the person’s initials which
John extracted from their full name in their user
information, a word found in the dictionary)
 On the first try it took four days to crack the last of
the three passwords
Websites used
 http://www.iss.net/security_center/advice/Undergrou
nd/Hacking/Methods/Technical/crack/default.htm
 http://www.openwall.com/john/

You might also like