WisdomEye Logo
WisdomEye

Kali Linux: Using John the Ripper Tool [Part 28]

Summary

This video provides a practical demonstration of using John the Ripper, a powerful password-cracking tool, within the Kali Linux environment. It covers how to locate the tool through the GUI, access the system's sensitive '/etc/shadow' file, and identify the SHA-512 encryption algorithm used for storage. The tutorial concludes by executing terminal commands to crack the password hash for the root user, successfully revealing 'toor' as the plain text password. It highlights the tool's efficiency in security auditing and recovering credentials from secure Linux hashes.

Key Insights

John the Ripper is a robust industrial-standard tool integrated into Kali Linux for cracking various types of encrypted hashes.

John the Ripper is widely recognized in the cybersecurity industry for its ability to crack encrypted password hashes. In Kali Linux, it is pre-installed and can be accessed via the applications menu under password cracking. It supports a wide range of algorithms and is particularly effective at identifying and breaking the hashes stored within Linux system files, making it a staple tool for penetration testers and security auditors.

The '/etc/shadow' file serves as the primary repository for hashed password data in Linux systems to enhance security.

Linux operating systems utilize the '/etc/shadow' file to store sensitive password information separately from the general user information in '/etc/passwd'. The shadow file contains the username followed by a long string of hashes, which prevents plain text passwords from being exposed. Accessing this file typically requires root privileges, and it often uses strong encryption like SHA-512 to protect the integrity of the credentials.

Kali Linux employs the SHA-512 algorithm, which provides high security but remains vulnerable to advanced cracking tools like John the Ripper.

As shown in the video, Kali Linux uses the SHA-512 (Secure Hashing Algorithm 512-bit) version for password encryption in the shadow file. While SHA-512 is considered a very secure and robust algorithm designed to resist unauthorized access, tools like John the Ripper use dictionary attacks and brute-force techniques to eventually reveal the plain text password, demonstrating that even strong algorithms require complex passwords to be effective.

Sections

Introduction to John the Ripper

Locating John the Ripper within the Kali Linux GUI and understanding its role as a specialized password auditing and cracking tool.

The instructor begins by showing where John the Ripper is located within the Kali Linux operating system. By navigating to the Applications menu and selecting the Password Cracking category, users can find the tool. The video explains that John the Ripper is a versatile password cracker used to break hashes inside files. It displays the version information in the terminal and mentions that there are numerous ways to use the tool, though the focus here is on cracking local system login files.


Locating and Understanding the Shadow File

Navigating the Linux directory structure to find the '/etc/shadow' file which stores the hashed passwords for all system users.

The video provides a step-by-step guide to finding the shadow file. The user needs to go to 'Places', then 'Computer', and open the 'etc' folder. Deep within this folder is the 'shadow' file. Upon opening it, the instructor points out that while the username 'root' is visible in plain text, the accompanying password is represented as a complex hash. This structure is a security feature of the Linux operating system to prevent direct reading of user passwords.


Identifying the Hashing Algorithm

Using the 'john' command in the terminal to automatically detect the specific encryption algorithm protecting the shadow file contents.

To begin the cracking process, the instructor opens a terminal and runs 'john /etc/shadow'. This command triggers the tool to analyze the file and identify the encryption method. The tool reports a warning that the detected hash type is SHA-512 (Secure Hashing Algorithm 512). The instructor notes that this is a very strong and secure algorithm, emphasizing that the cracking tool must be powerful enough to handle such industrial-grade encryption levels.


Executing the Password Crack

Running the cracking process and using the show command to reveal the recovered plain text password for the root user.

After identifying the hash, the instructor demonstrates the final cracking step. By typing 'john /etc/shadow --show', John the Ripper checks its progress and displays the cracked credentials. The output confirms that one password hash was cracked successfully. It reveals that for the username 'root', the password is 'toor'. The video concludes by explaining that John the Ripper utilizes dictionaries and files to crack these hashes, effectively converting the SHA-512 hash back into plain text in seconds.


Ask a Question

*Uses 1 Wisdom coin from your coin balance

Watch Video

Open in YouTube