Tuesday, 14 August 2012

Cracking Unix Password On Backtrack 5


Cracking Unix Password
Cracking Unix Password
  • After getting a open session, use the 'ls command ' to see the directories .
  • Command Used : lsimage 
  • See the below image , it show the various directories of remote system (metasploitable)- 
Passwd File

  • Password File shows the User Account Information.
  • The next step is to open a 'passwd' using cat command .
  • Command Used : cat /etc/passwd
  • As you enter the command , below you see the all the account of remote system (metasploit).
  • Do one more thing make a copy of passwd file and save anywhere in my case i open  my password file in vim editor and save as a passwordfile.txt .
  • Now few things to remember - 
  1. ' In this line >> root : x:0:0:root:/root:/bin/bash 
  2. Here 'x' means password which is encrypted and stored in /ctc/shadow  file with other information such as account and password expiration information . 
  3. '0' means root account and another '0' means groupID .
  4. 'root' in this we can find extra information.( but here no extra information display ).
  5. 'root '  it is the user home directory 
  6. /bin/bash - It show the user shell account .
  • See the below image to understand more clearly-

Passwd File

Shadow File 

  • Shadow file shows the secure user account information.
  • To view shadow file use the command given below .
  • Command Used : cat  /etc/shadow 
  • This command show you the shadow file . 
  • Also copy the shadow file and give a output name as shadowfile.txt and save it on the home directory.
  • Now Things to remember - 
  1. In the root account : root :$1$/avpfBJ1$x0z8w5UF9Iv./DR9E9Lid.:14747:0:99999:7: ::
  2. Here 'root' is the username which show match to the /etc/passwd file .
  3. $1$ : means MD5 encryption is used .
  4. avpfBJ1$x0z8w5UF9Iv./DR9E9Lid is your encrypted password.
  5. 14747 : tells the last password changed (last changed).
  6. '0' tells the  minimum number of days left before the user s allowed to change password.
  7. 99999 : show maximam number of days the password is valid .
  8. And on other account you can see the ' * '. It  means the account is disabled.
  • See the below image for more details - 

Shadow File

JOHN THE RIPPER 

  • Now open ' John the Ripper ' .
  • Using 'John the Ripper' we are going to crack the hashes.
  • To open John the Ripper , follow the given path -
  • BackTrack > Priviledge Escalation > Password Attack > Offline Attack > john the ripper 
  • See the below image for more details - 

John the ripper


  • Here is 'john the ripper'.
  • See the below image for more details - 


SELECT YOUR FILE 

  • Now select and copy your 'passwordfile.txt' and 'shadowfile.txt ' and save it to the 'John the Ripper ' directory , which is under Root > pentest > passwords > john 


JOHN THE RIPPER DIRECTORY 

  • Under the john directory paste your both files( passwordfile.txt & shadowfile.txt ) .
  • See the below image for more details -

paste files

CHECK YOUR BOTH FILES

  • Now check for both the file , is it in the john directory or not .
  • Command Used : ls
  • See the below image both the file are there - 

ls command

UNSHADOW 

  • In the below image , see the utility named unshadow , now before crack we have to use it to make shadow file readable . 
  • Now one more you have to do is making 1 output file named : Crackedfile.txt using the below command-
  • Command Used : ./unshadow passwordfile.txt shadowfile.txt > Crackedfile.txt
  • Use 'ls' command to see your Crackedfile.txt -
unshadow command

CRACK WITH JOHN THE RIPPER 

  • Using john the ripper crack the hashes .
  • Command Used : ./john Crackedfile.txt
  • See the below image for more details -

start john the ripper

For Passwords
  • To see passwords enter the command .
  • Command Used: ./john --show Crackedfile.txt
  • See the below image for more details -

passwords


THIS IS HOW WE CAN " CRACK THE UNIX PASSWORDS "

JOIN US 
ON 
FACEBOOK

THIS TUTORIAL IS JUST FOR EDUCATIONAL PURPOSE ONLY /- 

0 comments:

Categories

Angry IPScanner On Backtrack 4 Arduino Arduino Opensource community attacks on router auditing tool Aurora Exploiting Through Kali Linux AUTOSCAN ON BACKTRACK 5 BackBox Linux On hackingDNA Backtrack 5 : Linux Commands Backtrack Bootable Pendrive Backtrack Tool : The Harvester Blender On Backtrack 5 Block Command Prompt Browser Autopwn On Backtrack 5 BUGTRAQ LOG REMOVER BLEACHBIT chkrootkit on Backtrack 5 chntpw on backtrack 5 cisco switches routing auditing tool. Client Side Attack On Backtrack 5 Command Shell Upgrade On Backtrack 5 Conky On Backtrack 5 convert guest account into admin using chntpw in backtrack 5 Convert Jpg Image into Ascii on Backtrack 5 countermeasures Cracking Unix Password On Backtrack 5 Cupp On Backtrack 5 Cutycapt On Kali Linux Detect Sniffer6 On Kali Linux dmitry on backtrack 5 Dnmap On Kali Linux dnsenum on backtrack 5 dnsrecon on backtrack 5 dnstracer on backtrack 5 dnswalk on backtrack 5 DOMAIN TOOL ON BUGTRAQ Dos attack driftnet on backtrack 5 dsniff on backtrack 5 enum4linux esp8266 EtherApe On BackTrack 5 ewizard on backtrack 5 ExifTool On BackTrack 5 Exploit Distccd On BackTrack 5 Exploit RDP Vulnerability On Kali Linux Exploit Samba Server On Backtrack 5 fatback on backtrack 5 FERN CRACKER ON BACKTRACK 5 Fierce in Backtrack 5 findmyhash : Crack the hash on Backtrack 5 Firewalk-Script On BackTrack 5 Firewall On Backtrack 5 Flash Player On Backtrack 5 Genlist On Backtrack 5 Gerix Cracker On Backtrack 5 Get Your Data Back Golismero On BackTrack 5 GOOFILE ON BUGTRAQ Google Kung-Fu goohost on backtrack 5 Grendel-Scan On Backtrack 5 gtk-recordmydesktop on backtrack 5 HACK BACKTRACK 5 via RAT Hack The Database with Backtrack 5 Hack the Facebook with Backtrack 5 Hack the windows in GNS3 Hack Windows XP using Backtrack 5 Hack Windows Xp using msfconsole hacking Hacking Lab 01 Hacking Windows 7 USING Backtrack 5 hackingdna hackingDNA choice :Best Antivirus Detection honeyd on backtrack 5 honeypot on backtrack 5 HOW TO INSTALL REDHAT ENTERPRISE LINUX 5 How to block ICMP request How To Install CAINE How to Install Chromium Browser on Backtrack 5 How to Install Windows 7 Ultimate How To Install Xampp On Kali Linux How to make new User in Backtrack 5 How to see files and directories on Linux how to use arduino in kali linux How to use Host Command on Backtrack 5 How to use Nano Editor on Backtrack 5 How to use Ping Command on Backtrack How to use whois tool on Backtrack 5 hping2 on backtrack 5r2 Httprint On BackTrack 5 icmpv6 flooding attack ifconfig command Installing And Accessing Backdoor On Backtrack 5 Installing software on Backtrack 5 using apt-get ipcalc on backtrack 5 Itrace On BackTrack 5 Jigsaw On Backtrack 5 Joomscan On Backtrack 5 KALI ARMITAGE ON KALI LINUX kali linux kali linux arduino Kali Linux Installation Kali Rolling Release 2016.2 keimpx on backtrack 5 Lanmap On Backtrack 4 Learn arping on Backtrack 5 Learn Basic of Internet with DAWN OF THE NET Learn Basics if Screen Utility Learn cmospwd on Backtrack 5 Learn dnsdict6 on backtrack 5 Learn fping on Backtrack 5 Learn Help Utilities Command On Backtrack 5 Learn hexedit on Backtrack 5 Learn how to hack root account on REDHAT5 Learn How to Install Backtrack 5 Learn how to make Bootable Pendrive Learn how to split Terminal into different regions Learn How To Split Terminal on backtrack 5 Learn how to use Armitage in Backtrack 5 Learn how to use chntpw on backtrack 5 LEARN HOW TO USE CISCO PACK ON BUGTRAQ - II Learn How to use ettercap on Backtrack 5 for hacking username and passwords Learn how to use Netstat Commands On Backtrack 5 Learn how to use nipper Learn How to work with Vim editor on Backtrack 5 Learn Linux Commands on Backtrack Environment Learn Netdiscover On Backtrack 5 Learn Pentbox On Backtrack 5 Learn Recoverjpeg on Backtrack 5 Learn samdump on backtrack 5 Learn TrueCrypt On Backtrack 5 LINUX NETWORKING COMMANDS ON BACKTRACK 5 linux OS LINUX PARTITION ON BACKTRACK 5 List-Urls On Backtrack 4 Load Balancing Detector On Backtrack 5 LOG REMOVER BLEACHBIT Lynis On Backtrack 5 Mac Tracker On Backtrack 5 macchanger on backtrack 5 Matriux Installation On hackingDNA Metaexploit Framework : Collecting Email Addresses Metasploit Framework With Basic Commands Meterpreter on Backtrack 5 mitre-cve on backtrack 5 MSF AUXILIARY SCANNING ON BACKTRACK 5 msf scanning on backtrack 5 nbtscan on backtrack 5 NESSUS ON BACKTRACK 5 Net Card Config Netcat : Learn how to create a instant chat session on Backtrack 5 netenum on backtrack 5 Netifera On Backtrack 5 NETMASK On Backtrack 5 NIKTO ON KALI LINUX Nmap Scanning On Backtrack 5 nmap smb script offensive security Oneko And Cowsay On BackTrack 5 OpenOffice On Backtrack 5 OpenVAS On Backtrack 5 Orion Browser History Dumper v1.0 Penetration Testing Pipal On Backtrack 5 PostgreSQL On Kali Linux Practice Session On Backtrack 5 PROTOS on backtrack 5 Reconnaissance Recover Kali Password Remote Desktop Connection Remote Desktop On Backtrack 5 Remote Desktop Sharing Removing Backdoor on Backtrack 5 Restrict Control Panel Restrict Registry Editor by Group Policies Rkhunter On Backtrack 5 router auditing tool Router Penetration Testing router security Safecopy On Backtrack 5 samba testing samrdump on backtrack 5 Scanning security auditing tool Shell Scripting On Kali Linux Shrink and Create Partition on Windows 7 Shutter On Backtrack 5 siege on backtrack 5 smb enumeration smb hacking Smbclient On Backtrack 5 Smtpscan On Backtrack 5 SMURF6 ON KALI LINUX Sniff Images on Backtrack 5 using Driftnet Snort On Backtrack 5 snurf6 Software Updates On Kali linux Spoof Your MAC Address on Backtrack 5 sql attack SSID ssldump on backtrack 5 sslstrip on backtrack 5 Start Backtrack 5 Without Startx Steam Locomotive On BackTrack5 Stop Bruteforce attack System Monitor On Backtrack 5 tcptraceroute on backtrack 5 Tctrace On Backtrack 5 TeamViewer On BackTrack 5 TELNET On Backtrack 5 Terminator On Backtrack 5 the Harvester On Backtrack 5 Things you should know about Backtrack Tweak Your System Settings On Backtrack 5 Tweak Your System Settings On Backtrack 5 Part 2 Unicornscan On BackTrack 5 Uniscan On Backtrack 5 urlcrazy on backtrack 5 urlsnarf on backtrack 5 WBOX on Backtrack 4 and 5 Weak points Web Httrack::Web Copier Websecurify On BackTrack5 Webshag On Backtrack 5 WEP CRACKING ON BACKTRACK 5 whatweb on backtrack 5 WHATWEB ON BUGTRAQ Wiffit (wafw00f): Firewall Detection Tool On Backtrack 5 wireshark Xpdf On Backtrack 5 xprobe2 on backtrack 5 Zenmap

Popular Posts