Virtualization Adapted Adapting Business Processes for Virtual Infrastrcuture (and vice-versa)

2009/04/19

Cracking Cisco Passwords with John the Ripper

Filed under: Uncategorized — Tags: , , , , — iben @ 19:12

InfoSec Survival Guide: Cracking Cisco Passwords with John

http://infosecsurvivalguide.blogspot.com/2008/11/cracking-cisco-passwords-with-john.html

http://www.openwall.com/john/pro/macosx/

http://www.macshadows.com/forums/index.php?showtopic=8506

John the Ripper 1.7.3.1
http://mac.softpedia.com/get/Security/John-the-Ripper.shtml

John the Ripper 1.7.2 for G4 PowerPC, G5 PowerPC and Intel Macs (Universal Binary) (released 11/30/07)
http://www.macunix.net/JTR/john-1.7.2-macosx-universal.zip

Download the pre-patched (for OS X salted SHA1 hashes too) pre-compiled version of John the Ripper here:
http://www.macunix.net/JTR/

Unzip the archive.

Open Terminal.

Drag the file “john” from the folder “run” from within the unzipped “john-1.7.2-macosx-universal” folder to the Terminal window and let go.

Type a space.

Drag the text file containing your hash ( student:078D486A55E9922772C7F6F46113038E4800D6EDF4D31720 ) to the Terminal window and let go.

Click back in the Terminal window and press the return key.
QUOTE
Loaded 1 password hash (Salt SHA1 [salt-sha1])
barlow (student)

No Comments »

No comments yet.

RSS feed for comments on this post. TrackBack URL

Leave a comment

You must be logged in to post a comment.

Powered by WordPress