10
Most read
13
Most read
21
Most read
Presentation on
John The Ripper and Hydra
Password Cracking Tools
PRESENTED BY
Name Roll No:
1. Shahidur Rahman 1703035
2. Md. Raquibul Hoque 1703041
3. Md. Moshiur Rahman 1703025
PASSWORD CRACKING
• 1. Low Tech
• - Social Engineering
• - Shoulder surfing
• - password guessing
• 2. Hight Tech
• - Brute –force attack
• - Dictionary attack
• - Rainbow attack
PASSWORD CRACKING TOOLS
• John the Ripper
• Aircrack-ng
• RainbowCrack
• Cain and Abel
• THC Hydra
• HashCat
• Crowbar
• OphCrack
• Etc.
JOHN THE RIPPER
OVERVIEW
• First stable release in May 2013, Version 1.8
• Initially developed for the Unix operating
system, it now runs on fifteen different
platforms.
• It uses Brute force & Dictionary attack
• It has 3 modes. Single, Incremental & Wordlist
TYPES
• 1. John the Ripper Pro -Linux and Mac OSX
• 2. John the Ripper Official –All Platforms
• 3. John the Ripper Community Enhanced –All
Platforms
HOW IT WORKS
Open the Tools in Kali linus
HOW IT WORKS
• Type “man john” in the terminal
HOW IT WORKS
• Add User
HOW IT WORKS
• Wordlist and Shadow file
HOW IT WORKS
• Shadow file
HOW IT WORKS
HYDRA
OVERVIEW
Developed by Van Hauser from The Hacker’s Choice and David Maciejak
• Uses a dictionary attack or brute force methods to test for weak or "simple“
passwords.
• Platforms : Linux, Mac OS, Windows/Cygwin etc.
• Its more famous because it can support around 30 protocols like ftp, http, https
etc.
• Other tools like Medusa and Ncrack provide similar speed.
• It is available as a GUI also (even though a little difficult to get in windows).
INSTALLING HYDRA
• Linux based
Many have them pre-installed, else $ apt-get install hydra e $ apt-get install hydra $
apt-get install hydra-gtk
• Windows
Download hydra zip file
Install Cygwin
Compile hydra using cygwin
HYDRA GUI
HYDRA GUI
HYDRA GUI
John the ripper & hydra password cracking tool
HYDRA COMMAND SYNTAX
• Syntax: hydra fir-I LOGIN -L FILE] [p PASSI-P FILE]] I [C FILE]] [e nsr] [0 FILE] [t TASKS] [M
FILE [T TASKS]] 1w TIME] [W TIME] 14] [5 PORT] [x MIN:MAX:CHARSET] [SuvV46]
[service://servertPORTNOPT]] [v/ -V]
• Simplified basic syntax: hydra —1/-L <user> -p/-P <passwords> <IP address> <protocoI><form
parameters> <failed login message>
• -I/-L LOGIN or -L FILE login with LOGIN name, or load several logins from FILE
• -p /-P PASS or -P FILE try password PASS, or load several passwords from FILE
• <IP address> is the host address.
• <protocol> is the protocol used in that page.
• <form parameters> is the parameters when brute forcing web forms
• <failed login message> is the message you get, when you enter invalid usernames and passwords.
CONCLUSION
• Password Cracking Depends on
• Attacker’s strengths
• Attacker’s computing resources
• Attacker’s knowledge
• Attacker’s mode of access [ physical or online]
• Strength of the passwords How often you change your passwords?
• How close are the old and new passwords?
• How long is your password?
• Have you used every possible combination alphabets, numbers and special characters?
• How common are your letters, words, numbers or combination?•
• Have you used strings followed by numbers or vice versa, instead of mixing them
randomly?
CONCLUSION
Thank you
Any question??

More Related Content

PPTX
Jhon the ripper
PPTX
Boolean Algebra
PPTX
Class:10 Political Science,Power sharing
PDF
An Introduction to Generative AI
PPTX
PPTX
Automotive Hacking
PPTX
password cracking using John the ripper, hashcat, Cain&abel
PDF
Telemedicine Business Plan Example | upmetrics
Jhon the ripper
Boolean Algebra
Class:10 Political Science,Power sharing
An Introduction to Generative AI
Automotive Hacking
password cracking using John the ripper, hashcat, Cain&abel
Telemedicine Business Plan Example | upmetrics

What's hot (20)

PDF
Palo alto outline course | Mostafa El Lathy
PPT
Pentesting Using Burp Suite
PPTX
Burp suite
PDF
Securing AEM webapps by hacking them
PPTX
Metasploit framwork
ODP
Web Application Firewall
PPTX
Recon with Nmap
PDF
Building Advanced XSS Vectors
PDF
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
PPTX
Thick client pentesting_the-hackers_meetup_version1.0pptx
PDF
Burp suite
PPTX
Password craking techniques
PPTX
Network scanning
PDF
OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
PDF
Nessus Software
PDF
Secure Code Review 101
PDF
Hunting for security bugs in AEM webapps
PPTX
SSRF For Bug Bounties
PDF
Zabbix Monitoring Platform
Palo alto outline course | Mostafa El Lathy
Pentesting Using Burp Suite
Burp suite
Securing AEM webapps by hacking them
Metasploit framwork
Web Application Firewall
Recon with Nmap
Building Advanced XSS Vectors
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
Thick client pentesting_the-hackers_meetup_version1.0pptx
Burp suite
Password craking techniques
Network scanning
OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
Nessus Software
Secure Code Review 101
Hunting for security bugs in AEM webapps
SSRF For Bug Bounties
Zabbix Monitoring Platform
Ad

Similar to John the ripper & hydra password cracking tool (20)

PPTX
The FatRat
PDF
Socially Acceptable Methods to Walk in the Front Door
PDF
Check Your Privilege (Escalation)
PDF
Proposalforootconf
PPT
unixkkkkmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmkkk.ppt
PPTX
Linux privesc.pptx
PPT
Don’t turn your logs into cuneiform
PDF
Bz backtrack.usage
PDF
Codemotion 2012 Rome - An OpenShift Primer
PPTX
Linuxtraining 130710022121-phpapp01
PDF
IX 2020 - Internet Security & Mitigation of Risk Webinar: Linux Malware and D...
PDF
MOBILE PENTESTING Frida.pdf
PDF
Adhocr T-dose 2012
PDF
24HOP Introduction to Linux for SQL Server DBAs
PPTX
Ethical hacking
PDF
Suricata: A Decade Under the Influence (of packet sniffing)
PDF
Bz backtrack.usage
PDF
For the Greater Good: Leveraging VMware's RPC Interface for fun and profit by...
PDF
Command line for the beginner - Using the command line in developing for the...
The FatRat
Socially Acceptable Methods to Walk in the Front Door
Check Your Privilege (Escalation)
Proposalforootconf
unixkkkkmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmkkk.ppt
Linux privesc.pptx
Don’t turn your logs into cuneiform
Bz backtrack.usage
Codemotion 2012 Rome - An OpenShift Primer
Linuxtraining 130710022121-phpapp01
IX 2020 - Internet Security & Mitigation of Risk Webinar: Linux Malware and D...
MOBILE PENTESTING Frida.pdf
Adhocr T-dose 2012
24HOP Introduction to Linux for SQL Server DBAs
Ethical hacking
Suricata: A Decade Under the Influence (of packet sniffing)
Bz backtrack.usage
For the Greater Good: Leveraging VMware's RPC Interface for fun and profit by...
Command line for the beginner - Using the command line in developing for the...
Ad

Recently uploaded (20)

PPTX
"Secure File Sharing Solutions on AWS".pptx
PDF
Microsoft Office 365 Crack Download Free
PDF
Autodesk AutoCAD Crack Free Download 2025
PDF
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PPTX
Patient Appointment Booking in Odoo with online payment
PDF
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
AI Guide for Business Growth - Arna Softech
PDF
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
PDF
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PDF
How Tridens DevSecOps Ensures Compliance, Security, and Agility
PDF
Time Tracking Features That Teams and Organizations Actually Need
PPTX
GSA Content Generator Crack (2025 Latest)
PDF
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
PPTX
assetexplorer- product-overview - presentation
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PPTX
Introduction to Windows Operating System
PPTX
Cybersecurity: Protecting the Digital World
"Secure File Sharing Solutions on AWS".pptx
Microsoft Office 365 Crack Download Free
Autodesk AutoCAD Crack Free Download 2025
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
Oracle Fusion HCM Cloud Demo for Beginners
Patient Appointment Booking in Odoo with online payment
Multiverse AI Review 2025: Access All TOP AI Model-Versions!
Designing Intelligence for the Shop Floor.pdf
AI Guide for Business Growth - Arna Softech
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
AI/ML Infra Meetup | LLM Agents and Implementation Challenges
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
How Tridens DevSecOps Ensures Compliance, Security, and Agility
Time Tracking Features That Teams and Organizations Actually Need
GSA Content Generator Crack (2025 Latest)
AI/ML Infra Meetup | Beyond S3's Basics: Architecting for AI-Native Data Access
assetexplorer- product-overview - presentation
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Introduction to Windows Operating System
Cybersecurity: Protecting the Digital World

John the ripper & hydra password cracking tool

  • 1. Presentation on John The Ripper and Hydra Password Cracking Tools
  • 2. PRESENTED BY Name Roll No: 1. Shahidur Rahman 1703035 2. Md. Raquibul Hoque 1703041 3. Md. Moshiur Rahman 1703025
  • 3. PASSWORD CRACKING • 1. Low Tech • - Social Engineering • - Shoulder surfing • - password guessing • 2. Hight Tech • - Brute –force attack • - Dictionary attack • - Rainbow attack
  • 4. PASSWORD CRACKING TOOLS • John the Ripper • Aircrack-ng • RainbowCrack • Cain and Abel • THC Hydra • HashCat • Crowbar • OphCrack • Etc.
  • 5. JOHN THE RIPPER OVERVIEW • First stable release in May 2013, Version 1.8 • Initially developed for the Unix operating system, it now runs on fifteen different platforms. • It uses Brute force & Dictionary attack • It has 3 modes. Single, Incremental & Wordlist
  • 6. TYPES • 1. John the Ripper Pro -Linux and Mac OSX • 2. John the Ripper Official –All Platforms • 3. John the Ripper Community Enhanced –All Platforms
  • 7. HOW IT WORKS Open the Tools in Kali linus
  • 8. HOW IT WORKS • Type “man john” in the terminal
  • 9. HOW IT WORKS • Add User
  • 10. HOW IT WORKS • Wordlist and Shadow file
  • 11. HOW IT WORKS • Shadow file
  • 13. HYDRA OVERVIEW Developed by Van Hauser from The Hacker’s Choice and David Maciejak • Uses a dictionary attack or brute force methods to test for weak or "simple“ passwords. • Platforms : Linux, Mac OS, Windows/Cygwin etc. • Its more famous because it can support around 30 protocols like ftp, http, https etc. • Other tools like Medusa and Ncrack provide similar speed. • It is available as a GUI also (even though a little difficult to get in windows).
  • 14. INSTALLING HYDRA • Linux based Many have them pre-installed, else $ apt-get install hydra e $ apt-get install hydra $ apt-get install hydra-gtk • Windows Download hydra zip file Install Cygwin Compile hydra using cygwin
  • 19. HYDRA COMMAND SYNTAX • Syntax: hydra fir-I LOGIN -L FILE] [p PASSI-P FILE]] I [C FILE]] [e nsr] [0 FILE] [t TASKS] [M FILE [T TASKS]] 1w TIME] [W TIME] 14] [5 PORT] [x MIN:MAX:CHARSET] [SuvV46] [service://servertPORTNOPT]] [v/ -V] • Simplified basic syntax: hydra —1/-L <user> -p/-P <passwords> <IP address> <protocoI><form parameters> <failed login message> • -I/-L LOGIN or -L FILE login with LOGIN name, or load several logins from FILE • -p /-P PASS or -P FILE try password PASS, or load several passwords from FILE • <IP address> is the host address. • <protocol> is the protocol used in that page. • <form parameters> is the parameters when brute forcing web forms • <failed login message> is the message you get, when you enter invalid usernames and passwords.
  • 20. CONCLUSION • Password Cracking Depends on • Attacker’s strengths • Attacker’s computing resources • Attacker’s knowledge • Attacker’s mode of access [ physical or online] • Strength of the passwords How often you change your passwords? • How close are the old and new passwords? • How long is your password? • Have you used every possible combination alphabets, numbers and special characters? • How common are your letters, words, numbers or combination?• • Have you used strings followed by numbers or vice versa, instead of mixing them randomly?