SlideShare a Scribd company logo
PRESENTED BY: SHWETA SHARMA
password cracking using John the ripper, hashcat, Cain&abel
A. SOCIAL ENGINEERING
B. SHOULDER SURFING
C. GUESSING PASSWORDS
H
I
G
H
-
T
E
C
H
M
E
T
H
O
D
S
 John the Ripper
 Hashcat
 Cain and Abel
 Hydra
 Rainbow Crack
 Brutus
 Medusa
 OphCrack
 Brute force and dictionary
 Modes
Single wordlist
Incremental
 Working of John the ripper
i. Open John in Kali Linux
ii. Open John in Kali Linux
iii. TYPE- “man john” in terminal
iv. ADD USER
v. ADD USER
vi. WORDLIST AND COPY OF SHADOW FILE
vii. SHADOW FILE
password cracking using John the ripper, hashcat, Cain&abel
viii. LOGIN SCREEN
password cracking using John the ripper, hashcat, Cain&abel
 Fastest CPU-based tool
 Modes
Straight Toggle-Case Brute force
Combination
 Working of Hashcat tool
OPEN HASH CAT TOOL
SYNTAX OF HASHCAT TOOL
HASH TYPES
ATTACK MODES
WEBSITE TO GET HASH
STORED HASH IN HASH FILE
PASSWORD LIST
PASSWORDS CRACKED BY HASHCAT
 Salt hash
 Fast
 Flexible
hashcat –a 3 hash.txt ?u?l?l?l?d?d
 Recovers Passwords
Dictionary
Brute-force
Cryptanalysis
 Features
 Password guessing
 Password Security
 No exploitation of vulnerability
CAIN TOOL
CAIN TOOL
NTLM HASH
IMPORT HASH FROM SYSTEM
APPLY DICTIONARY ATTACK
ADD DICTIONARY TO LIST
PRESS START
PASSWORD RECOVERED
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
 Establish strong password
 Do not use dictionary words
 Password age
 Stronger authentication method
 Updated system
 Different passwords
 Use punctuation characters
 Do not rely on similar looking
characters 3 --- E , 5 --- S , ! --- 1
 Do not share passwords
 Avoid storing passwords in an unsecured
location
 Do not use personal information like date
of birth, pet names.
 Failed login attempts
password cracking using John the ripper, hashcat, Cain&abel
password cracking using John the ripper, hashcat, Cain&abel
Use strong passwords and enforce a strong
password creation policy
password cracking using John the ripper, hashcat, Cain&abel

More Related Content

PPTX
PPTX
Linux commands
PPTX
Engineering Economy
PPT
Engineering economic importance & application
PPTX
Jhon the ripper
PPTX
Overview of Artificial Intelligence in Cybersecurity
PDF
GPT-2: Language Models are Unsupervised Multitask Learners
PDF
Ch 11: Hacking Wireless Networks
Linux commands
Engineering Economy
Engineering economic importance & application
Jhon the ripper
Overview of Artificial Intelligence in Cybersecurity
GPT-2: Language Models are Unsupervised Multitask Learners
Ch 11: Hacking Wireless Networks

What's hot (20)

PPTX
John the ripper & hydra password cracking tool
PPT
iOS Application Pentesting
PPTX
Malware Static Analysis
PPTX
Introduction to Malware Analysis
DOCX
What is AES? Advanced Encryption Standards
PPTX
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
PPTX
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
PDF
OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
PPTX
Memory forensics
PDF
Ceph RBD Update - June 2021
PPTX
The Indicators of Compromise
PPT
IDS and IPS
PDF
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PPT
Introduction To SELinux
PDF
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
PPTX
Bug Bounty 101
PDF
Deploying Privileged Access Workstations (PAWs)
PPTX
eMMC 5.0 Total IP Solution
PDF
Bug Bounty - Hackers Job
John the ripper & hydra password cracking tool
iOS Application Pentesting
Malware Static Analysis
Introduction to Malware Analysis
What is AES? Advanced Encryption Standards
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
OFFENSIVE: Exploiting DNS servers changes BlackHat Asia 2014
OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies
Memory forensics
Ceph RBD Update - June 2021
The Indicators of Compromise
IDS and IPS
How to steal and modify data using Business Logic flaws - Insecure Direct Obj...
Cryptography and Network Security William Stallings Lawrie Brown
Introduction To SELinux
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Bug Bounty 101
Deploying Privileged Access Workstations (PAWs)
eMMC 5.0 Total IP Solution
Bug Bounty - Hackers Job
Ad

Viewers also liked (20)

PPT
Wireshark Inroduction Li In
PDF
Ce Hv6 Module 18 Web Based Password Cracking Techniques
PDF
Ceh v5 module 13 web based password cracking techniques
PPTX
Kali Linux
PPTX
Ethical Hacking
PPTX
password cracking and Key logger
PPTX
Password craking techniques
PPT
Jack the ripper who is this -by andré
PPTX
Kali linux
PPTX
PPSX
Protocolo IPv4
PPTX
Ethical Hacking JtR Presentation
PPT
Jack the ripper
PPTX
Password Cracking
PPTX
Kali Linux
PDF
Nmap Basics
PPT
Wireshark Basics
PDF
Intro to White Chapel
PDF
Intoduction to VirtualBox English
PPTX
3Com ACCB-100
Wireshark Inroduction Li In
Ce Hv6 Module 18 Web Based Password Cracking Techniques
Ceh v5 module 13 web based password cracking techniques
Kali Linux
Ethical Hacking
password cracking and Key logger
Password craking techniques
Jack the ripper who is this -by andré
Kali linux
Protocolo IPv4
Ethical Hacking JtR Presentation
Jack the ripper
Password Cracking
Kali Linux
Nmap Basics
Wireshark Basics
Intro to White Chapel
Intoduction to VirtualBox English
3Com ACCB-100
Ad

Recently uploaded (20)

PDF
composite construction of structures.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Geodesy 1.pptx...............................................
PPTX
Lecture Notes Electrical Wiring System Components
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT
Project quality management in manufacturing
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
Construction Project Organization Group 2.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Welding lecture in detail for understanding
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Well-logging-methods_new................
PPTX
web development for engineering and engineering
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
composite construction of structures.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
Geodesy 1.pptx...............................................
Lecture Notes Electrical Wiring System Components
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Project quality management in manufacturing
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
573137875-Attendance-Management-System-original
Construction Project Organization Group 2.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Welding lecture in detail for understanding
R24 SURVEYING LAB MANUAL for civil enggi
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
bas. eng. economics group 4 presentation 1.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Well-logging-methods_new................
web development for engineering and engineering
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx

password cracking using John the ripper, hashcat, Cain&abel