John The Ripper Cheatsheet

kirbi2john 1password2john 7z2john DPAPImk2john adxcsouf2john aem2john aix2john andotp2john androidbackup2john androidfde2john ansible2john apex2john applenotes2john aruba2john atmail2john axcrypt2john bestcrypt2john bitcoin2john bitshares2john bitwarden2john bks2john blockchain2john ccache2john cisco2john cracf2john dashlane2john deepsound2john diskcryptor2john dmg2john ecryptfs2john ejabberd2john electrum2john encfs2john enpass2john ethereum2john filezilla2john geli2john hccapx2john htdigest2john ibmiscanner2john ikescan2john itunes_backup2john iwork2john kdcdump2john keychain2john keyring2john keystore2john kirbi2john known_hosts2john krb2john kwallet2john lastpass2john ldif2john libreoffice2john lion2john lotus2john luks2john mac2john mcafee_epo2john monero2john money2john mosquitto2john mozilla2john multibit2john neo2john office2john openbsd_softraid2john openssl2john padlock2john pcap2john pdf2john pem2john pfx2john pgpdisk2john pgpsda2john

pgpwde2john prosody2john ps_token2john pse2john pwsafe2john radius2john restic2john sap2john sense2john signal2john sipdump2john ssh2john sspr2john staroffice2john strip2john telegram2john tezos2john truecrypt2john vdi2john vmx2john zed2john bitlocker2john dmg2john gpg2john hccap2john keepass2john putty2john racf2john rar2john uaf2john vncpcap2john wpapcap2john zip2john doc/README.7z2john.md doc/pcap2john.readme.gz 1password2john 7z2john.pl DPAPImk2john adxcsouf2john aem2john aix2john.pl aix2john andotp2john androidbackup2john androidfde2john ansible2john apex2john applenotes2john aruba2john atmail2john.pl axcrypt2john bestcrypt2john bestcryptve2john bitcoin2john bitshares2john bitwarden2john bks2john blockchain2john ccache2john cisco2john.pl cracf2john dashlane2john deepsound2john diskcryptor2john dmg2john ecryptfs2john ejabberd2john electrum2john encfs2john enpass2john ethereum2john filezilla2john geli2john hccapx2john htdigest2john

ibmiscanner2john ikescan2john itunes_backup2john.pl iwork2john kdcdump2john keychain2john keyring2john keystore2john kirbi2john known_hosts2john krb2john kwallet2john lastpass2john ldif2john.pl libreoffice2john lion2john-alt.pl lion2john.pl lotus2john luks2john mac2john-alt mac2john mcafee_epo2john monero2john money2john mosquitto2john mozilla2john multibit2john neo2john office2john openbsd_softraid2john openssl2john padlock2john pcap2john pdf2john.pl pem2john pfx2john pgpdisk2john pgpsda2john pgpwde2john prosody2john ps_token2john pse2john pwsafe2john radius2john.pl radius2john restic2john sap2john.pl sense2john signal2john sipdump2john ssh2john sspr2john staroffice2john strip2john telegram2john test_tezos2john tezos2john truecrypt2john vdi2john.pl vmx2john zed2john 1password2john DPAPImk2john adxcsouf2john aem2john aix2john andotp2john androidbackup2john androidfde2john ansible2john apex2john applenotes2john aruba2john axcrypt2john bestcrypt2john

bestcryptve2john bitcoin2john bitshares2john bitwarden2john bks2john blockchain2john ccache2john cracf2john dashlane2john deepsound2john diskcryptor2john dmg2john ecryptfs2john ejabberd2john electrum2john encfs2john enpass2john ethereum2john filezilla2john geli2john hccapx2john htdigest2john ibmiscanner2john ikescan2john iwork2john kdcdump2john keychain2john keyring2john keystore2john kirbi2john known_hosts2john krb2john kwallet2john lastpass2john libreoffice2john lotus2john luks2john mac2john-alt mac2john mcafee_epo2john monero2john money2john mosquitto2john mozilla2john multibit2john neo2john office2john openbsd_softraid2john openssl2john padlock2john pcap2john pem2john pfx2john pgpdisk2john pgpsda2john pgpwde2john prosody2john ps_token2john pse2john pwsafe2john radius2john restic2john sense2john signal2john sipdump2john ssh2john sspr2john staroffice2john strip2john telegram2john test_tezos2john tezos2john truecrypt2john vmx2john zed2john

Cracking Modes

# Dictionnary attack
./john --wordlist=password.lst hashFile

 # Dictionnary attack using default or specific rules
./john --wordlist=password.lst --rules=rulename hashFile
./john --wordlist=password.lst --rules mypasswd

# Incremental mode
./john --incremental hashFile

# Loopback attack (password are taken from the potfile)
./john --loopback hashFile

# Mask bruteforce attack
./john --mask=?1?1?1?1?1?1 --1=[A-Z] hashFile --min-len=8

# Dictionnary attack using masks
./john --wordlist=password.lst -mask='?l?l?w?l' hashFile

MISC & Tricks

Wordlists & Incremental

Rules

Example For Mangling Passwords with John

Looking at the source code, we are able to get two usernames:

[email protected]

[email protected]

Trying to use the user magnus, the boss of the company, who was mentioned in the room description, we get an error message that the user is invalid.

Next, we try to log in with a random password with the two found usernames and the wild guess of [email protected]. All three logins seem to be valid, like the error message states, the given password is invalid.

With the found information, it's possible to craft a users.txt,and a password base.txt, which will then be used to generate wordlists, to brute force the login page.

For convenience, a hostname is used for the IP of the machine in the /etc/hosts file.

Add 10.10.211.106 securesolacoders.no to /etc/hosts

To mangle the passwords, a simple John rule is configured. Appending some numbers to the possible passwords and having a combination of a password with a number and a special character.

With the created rule, generate a wordlist from base.txt

Running Hydra to brute force the login page.

After several minutes, we are able to retrieve a password.

To generate a wordlist, that takes less time, the results of this gen

Last updated