john#
Rip hash#
Rip hash from encrypted files, for example: .zip, .pdf
There are tools usually ends with2john` that can do this for us
locate *2john*.zip file#
zip2john ./sensitive.zip > ./sensitive.zip.hashHash format#
Specify which hash format john should use to crack. eg raw-sha1
john --format=raw-sha1 ./hashSingle#
Useful for Linux credentials. Password generated based on the victim’s username, home directory name, and GECOS values (full name, room number, phone number, etc.).
echo 'r0lf:$6$ues25dIanlctrWxg$nZHVz2z4kCy1760Ee28M1xtHdGoy0C2cYzZ8l2sVa1kIa8K9gAcdBP.GI6ng/qA4oaMrgElZ1Cb9OeXO4Fvy3/:0:0:Rolf Sebastian:/home/r0lf:/bin/bash' > passwd
john --single ./passwdDictionary#
john --wordlist=/usr/share/wordlists/rockyou.txt ./hashIncremental#
Bruteforce all possible password
john --incremental ./hash