

- #Install john the ripper ubuntu 12.04 install#
- #Install john the ripper ubuntu 12.04 software#
- #Install john the ripper ubuntu 12.04 password#
- #Install john the ripper ubuntu 12.04 crack#
#Install john the ripper ubuntu 12.04 install#
Using the command line and an online tutorial I quickly managed to install the entire stack and get it working under simple tests. Installing LAMP (Linux, Apache, MySQL and PHP) or in my case MARIADB which I believe is a fork of MySQL.
#Install john the ripper ubuntu 12.04 software#
Being used to Windows and Ubuntu, I am quite used to installing software and it just working, and to me at the moment it seems that Fedora isn’t this friendly, maybe this will change as I use it more? In reality it probably took me far longer to do this than to just search for a resolution for Fedora, but again in my eyes, it seems Fedora unnecessarily makes life harder than it needs to be. In my frustration, I gave up and swapped my hard drive with another spare and installed Ubuntu Mate and with a couple of quick installs I was both happily ripping CDs and copying them to my server. Well, to my surprise I found that though I had installed a CD Ripper, it refused to rip the CD to MP3, even though I had installed LAME. However, I now had received a new Audio CD and wanted to rip it for use in my car as well as add it to the Vortexbox. The story was that I was still having issues with MP3 files, from my last piece, you might remember that I had managed to install an MP3 codec (LAME) and was able to play MP3 files I had stored on my Vortexbox Server.
#Install john the ripper ubuntu 12.04 password#
If that failed it might be worth trying some bigger password lists (such as the ‘rockyou’ list).Well, its been interesting these last few weeks to the point I actually gave up on Fedora for a while in frustration or as I explained it to John “I had a blonde moment!” The password may be hidden in the John password list I would just need to let the cracking process run to completion to find out.
#Install john the ripper ubuntu 12.04 crack#
I let the crack run for another hour before cancelling but the root account had still not being cracked. It’s not always this quick and of course we are still missing the ‘root’ account but you get the idea. Within a couple of seconds we appear to have a hit on most of the accounts: To start the crack, point John at our newly created file: We could supply a password list for John to use but it comes with a default set of passwords so we may as well try those first. Now we have the combined merged.txt file:

Unshadow Path_to_passwd Path_to_shadow > output.txt We can do this with a utility called ‘Unshadow’ (also included in Kali2 by default). However before we give the hashes to John, we need to combine the two files into one so that the user and the password hashes are merged. Once you have the two files we can begin cracking them with John the Ripper. (Again there are various ways you could grab these files – for a vey simple example using Metaspolitable 2 as the target see this post here: ) /etc/shadow -> Containing the corresponding password hashes for the users./etc/passwd -> Containing the user information.To be able to crack the accounts we need two files from the target system: John the Ripper is included by default with Kali 2 – which is what I am using here. In this example I am going to crack the account passwords used in Metasploitable 2 but the techniques here can be used in many different scenarios. This post assumes you have access to a the target filesystem in question and want to extract and then crack the password hashes from the local machine.
