- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 203字
- 2021-06-30 19:15:53
John the Ripper
This a powerful password-cracking tool available on Linux and Windows operating systems that is used by hackers to perform dictionary attacks. The tool is used to retrieve the actual user passwords from encrypted databases of desktop or web-based systems and applications. The tool works by sampling commonly used passwords and then encrypting them with the same algorithm and key used by a given system. The tool does a comparison between its results and those that have been stored in the database to see if there are matches.
The tool cracks passwords in only two steps. First, it identifies the encryption type of a password. It could be RC4, SHA, or MD5, among other common encryption algorithms. It also looks at whether the encryption is salted.
In the second step, the tool attempts to retrieve the original password by comparing the hashed password with many other hashes stored in its database. Figure 4 shows a screenshot of John the Ripper recovering a password from an encrypted hash:

- Learning OpenDaylight
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- Learning Windows Server Containers
- 從零開始寫Linux內核:一書學透核心原理與實現
- WindowsServer2012Hyper-V虛擬化部署與管理指南
- 嵌入式Linux系統開發:基于Yocto Project
- 計算機系統開發與優化實戰
- 高性能Linux服務器構建實戰:系統安全、故障排查、自動化運維與集群架構
- Linux網絡內核分析與開發
- Linux就該這么學
- Docker+Kubernetes應用開發與快速上云
- Android物聯網開發細致入門與最佳實踐
- AutoCAD 2014中文版從入門到精通
- NetDevOps入門與實踐
- Windows Vista終極技巧金典