kali John破解密码

runwu2204 Lv6

基本流程

使用相应的john获取对应文件的密码hash

此处以破解office的密码为例

1
2
3
$ office2john 从渗透看取证.pptx#其会输出对应的密码hash

从渗透看取证证.pptx:$office$*2007*20*128*16*ae5cec7759d56eba49f6e923a4657c6c*5c91c78a0990d6c1791b3d6577056ada*a1b73a76fb87442b4ecc8f9b3702784312f8a7e2

john破解一般读取的是文本文件内的hash,所以用管道符号输出至文件

1
$ office2john 从渗透看取证.pptx#其会输出对应的密码hash > a

使用john来破解对应的密码hash

1
2
3
4
5
6
7
8
9
10
11
12
13
$ john a --wordlist=pass.txt a
Using default input encoding: UTF-8
Loaded 1 password hash (Office, 2007/2010/2013 [SHA1 256/256 AVX2 8x / SHA512 256/256 AVX2 4x AES])
Cost 1 (MS Office version) is 2007 for all loaded hashes
Cost 2 (iteration count) is 50000 for all loaded hashes
Will run 12 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
287fuweiuhfiute (从渗透看取证.pptx)
1g 0:00:00:00 DONE (2023-07-28 16:32) 16.66g/s 4566p/s 4566c/s 4566C/s !@#59560955..quanzhshfnsdgsdf
Warning: passwords printed above might not be all those cracked
Use the "--show" option to display all of the cracked passwords reliably
Session completed.
#上面的"287fuweiuhfiute"即为密码
  • 标题: kali John破解密码
  • 作者: runwu2204
  • 创建于 : 2023-07-28 16:49:20
  • 更新于 : 2023-07-28 17:10:59
  • 链接: https://runwu2204.github.io/2023/07/28/Misc/杂学/kali John破解密码/
  • 版权声明: 本文章采用 CC BY-NC-SA 4.0 进行许可。
评论