- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 203字
- 2021-06-30 19:15:53
John the Ripper
This a powerful password-cracking tool available on Linux and Windows operating systems that is used by hackers to perform dictionary attacks. The tool is used to retrieve the actual user passwords from encrypted databases of desktop or web-based systems and applications. The tool works by sampling commonly used passwords and then encrypting them with the same algorithm and key used by a given system. The tool does a comparison between its results and those that have been stored in the database to see if there are matches.
The tool cracks passwords in only two steps. First, it identifies the encryption type of a password. It could be RC4, SHA, or MD5, among other common encryption algorithms. It also looks at whether the encryption is salted.
In the second step, the tool attempts to retrieve the original password by comparing the hashed password with many other hashes stored in its database. Figure 4 shows a screenshot of John the Ripper recovering a password from an encrypted hash:

- 電腦組裝與系統安裝
- Containerization with LXC
- 嵌入式Linux系統開發:基于Yocto Project
- Learn Helm
- 高性能Linux服務器構建實戰:系統安全、故障排查、自動化運維與集群架構
- Delphi Programming Projects
- Windows 7應用入門與技巧
- 計算機系統的自主設計
- Kali Linux高級滲透測試(原書第3版)
- Learn SwiftUI
- 統信UOS應用開發進階教程
- Learning Continuous Integration with Jenkins(Second Edition)
- Linux內核修煉之道
- Linux內核分析及應用
- 樹莓派+傳感器:創建智能交互項目的實用方法、工具及最佳實踐