(22)
https://orebibou.com/ja/home/201406/20140627_001/
https://www.openwall.com/john/
sudo su -
wget https://www.openwall.com/john/k/john-1.9.0.tar.gz
tar xvzf john-1.9.0.tar.gz
cd john-1.9.0
cd src
make clean linux-x86-64
cd ../run
./john
./unshadow /etc/passwd /etc/shadow > johnpasswd
chmod 400 johnpasswd
./john johnpasswd
rm -rf johnpasswd
(10)
※(11)の場合パスワードのハッシュ方式が($y)のためか動作しなかった
ハッシュ方式
$1→md5
$5→sha-256
$6→sha-512
apt update
apt install -y make gcc
wget https://www.openwall.com/john/k/john-1.9.0.tar.gz
tar xvzf john-1.9.0.tar.gz
cd john-1.9.0
cd src
make clean linux-x86-64
cd ../run
./john
./unshadow /etc/passwd /etc/shadow > johnpasswd
chmod 400 johnpasswd
./john johnpasswd
rm -rf johnpasswd
(RL9)
wget https://www.openwall.com/john/k/john-1.9.0.tar.gz
tar xvzf john-1.9.0.tar.gz
cd john-1.9.0
cd src
make clean linux-x86-64
cd ../run
./john
./unshadow /etc/passwd /etc/shadow > johnpasswd
chmod 400 johnpasswd
./john johnpasswd
rm -rf johnpasswd
- Windows Server
(2022)
https://www.openwall.com/john/
-- 1. PwDumpとJohn The Ripperをダウンロード、展開
-- 2. PwDumpでSAMデータベースからハッシュ化されたパスワードを取得
cd C:\Users\Administrator\Downloads\pwdump8-8.2\pwdump8
.\pwdump8.exe
.\pwdump8.exe > hash.txt
move hash.txt C:\Users\Administrator\Downloads\john-1.9.0-jumbo-1-win64\john-1.9.0-jumbo-1-win64\run
-- 3. パスワード解析
cd C:\Users\Administrator\Downloads\john-1.9.0-jumbo-1-win64\john-1.9.0-jumbo-1-win64\run
.\john
.\john --format=nt --users=testuser hash.txt
※
Error: UTF-16 BOM seen in input file.
となるので、sakuraエディタでBOMなしUTF8/CRLFに変更