- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 203字
- 2021-06-30 19:15:53
John the Ripper
This a powerful password-cracking tool available on Linux and Windows operating systems that is used by hackers to perform dictionary attacks. The tool is used to retrieve the actual user passwords from encrypted databases of desktop or web-based systems and applications. The tool works by sampling commonly used passwords and then encrypting them with the same algorithm and key used by a given system. The tool does a comparison between its results and those that have been stored in the database to see if there are matches.
The tool cracks passwords in only two steps. First, it identifies the encryption type of a password. It could be RC4, SHA, or MD5, among other common encryption algorithms. It also looks at whether the encryption is salted.
In the second step, the tool attempts to retrieve the original password by comparing the hashed password with many other hashes stored in its database. Figure 4 shows a screenshot of John the Ripper recovering a password from an encrypted hash:

- 嵌入式Linux開發技術
- Linux網絡管理與配置(第2版)
- 大學計算機應用基礎實踐教程(Windows 7+Office 2013)
- Learning Android Intents
- 混沌工程:復雜系統韌性實現之道
- 深入Linux內核架構與底層原理(第2版)
- Kubernetes從入門到實踐
- Windows Server 2012網絡操作系統企業應用案例詳解
- Linux使用和管理指南:從云原生到可觀測性
- Application Development in iOS 7
- Windows Server 2012網絡操作系統項目教程(第4版)
- 一學就會:Windows Vista應用完全自學手冊
- Windows 7使用詳解(修訂版)
- Windows Server 2008組網技術與實訓(第3版)
- 嵌入式微系統