Analysis Of Using John The Ripper

982 Words2 Pages

Purpose:
- To gain a more through understating and need for complex passwords, password cracking techniques and rainbow tables through using John the Ripper.
Materials:
- John the Ripper will be used to crack Windows XP user account passwords.
- PWDump7 will be used to acquire the hashes that make up the user account passwords on the Windows XP virtual machine.
- Windows notepad will be used to edit, create and save files.
- Windows XP will be running on a virtual machine.
- VMware Player is the virtual machine player that Windows 2000 Pro and XP will be running on.
- An HP laptop computer running Windows 8.1 will be used to operate VMware Player, which is then used to run John the Ripper on Windows XP.
Procedures and Results
PWDump7 will first be used to acquire the hashes that make up user account passwords on a Windows XP system. PWDump7.exe will be copied from the downloaded D2L file and pasted into C:WINDOWSsystem32. Once PWDump7.exe has been pasted into C:WINDOWSsystem32, the file will be ran through the command prompt. The command, “pwdump7 >> C:Log.txt” will be entered into the command prompt. This command states that the pwdump7.exe will run and send its output into a file name “Log.txt” on the C drive. The file contents consist of the hashes that make up the Windows XP passwords for this systems users. This will conclude the use of PWDump7.
John the Ripper will now be utilized to figure out the passwords of the users based on the hashes PWDump7 created. The Log.txt file that was created from running PWDump7 will now be moved from the C drive into the same file folder that has John the Ripper files inside of it. In this case, the “Log.txt” file will be moved to “C:Documents and SettingsAdministratorDesk...

... middle of paper ...

... any user to use and add too. The software developers that created John the Ripper and John the Ripper Pro also sell a collection of this very thing.
The speed at which John the Ripper was able to crack passwords that consisted of words was immensely faster than passwords that contained uppercase letters with lower case letters and numbers. It took 1 second for John the Ripper to crack the password “password” on one of the created Windows XP accounts. For the password, “F18H0rnet”, on another created account, John the Ripper had yet to crack the password after 30 minutes. A GPU processing card, like the NVIDIA Tesla K40, contains 1.4 Tflops of power from 2880 processing cores and would be an incredible assets to have if password cracking was to become a more common occurrence or the need to crack complex passwords in a timely and efficient manner was needed.

More about Analysis Of Using John The Ripper

Open Document