Cyber security

Ethical Hacking Using John The Ripper : A Step-by-Step Guide To Password Cracking

This repository contains a set of shell scripts designed to facilitate the ethical hacking process using John the Ripper, a powerful password cracking tool.

The project is divided into two main scripts: prerequisites.sh and pass_crack.sh, each serving a distinct purpose in the password cracking workflow.

Files:

prerequisites.sh: This script automates the setup process by updating system repositories, installing necessary dependencies, downloading and compiling John the Ripper from source code, and verifying the installation.

It encompasses steps 1 to 5 of the password cracking workflow. pass_crack.sh: This script focuses on the password cracking process, including downloading the rockyou.txt wordlist, extracting the hash from a target RAR file, cracking the password hash using the wordlist, and analyzing the results.

It encompasses steps 6 to 9 of the password cracking workflow. Usage:

1:Clone the repository to your local machine using the command:

2:Navigate to the repository directory:

cd ethical-hacking-john-the-ripper

3:Make the shell scripts executable:

chmod +x prerequisites.sh pass_crack.sh

4:Execute the Prerequisites.sh script to set up the environment:

./Prerequisites.sh

5:Execute the pass_crack.sh script to perform the password cracking process:

./pass_crack.sh

Note:

Ensure that you have appropriate permissions to execute the scripts. Modify the target_file.rar variable in pass_crack.sh to specify the path to your target RAR file.

These scripts are intended for educational and ethical hacking purposes only. Usage for malicious activities is strictly prohibited.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

SpyAI : Intelligent Malware With Advanced Capabilities

SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze…

9 hours ago

Proxmark3 : The Ultimate Tool For RFID Security And Analysis

The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research,…

9 hours ago

Awesome Solana Security : Enhancing Program Development

The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more…

9 hours ago

IngressNightmare-POCs : Understanding The Vulnerability Exploitation Flow

The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting…

10 hours ago

AdaptixC2 : Enhancing Penetration Testing With Advanced Framework Capabilities

AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It…

10 hours ago

Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation

Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to…

10 hours ago