O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

We will now attempt to crack passwords using a pre-defined wordlist:

  1. Verify you have the shadow file copied in the root directory:
Directory listing
  1. Let's extract the rockyou password list:
gunzip /usr/share/wordlists/rockyou.txt.gz
  1. Let's use John the Ripper with the password file that we just extracted against the shadow file. You will note that we have some passwords that we recovered that appear like very simple passwords:
cd  john --rules -w=/usr/share/wordlists/rockyou.txt shadow john --show shadow
John the Ripper ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required