O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

We will use a brute force method of attack on password hashes:

  1. Verify you have the shadow file copied in the root directory:
Directory listing
  1. To use a brute force attack against our shadow file we can use the following commands. This command will take a very long time to crack any passwords and is considered as a last resort:
cdjohn -incremental:lanman shadow
John the Ripper progress screen
You can press the spacebar at any time to get an update as to how the password cracking is going. Also, there are several options after ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required