Kali Linux – Password Cracking Tools

kali linux

In this chapter, we will learn about the important password cracking tools used in Kali Linux. Password Cracking Tools.

Hydra

Hydra is a login cracker that supports many protocols to attack ( Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP).

To open it, go to Applications → Password Attacks → Online Attacks → hydra.

hydra

It will open the terminal console, as shown in the following screenshot.

open terminal

In this case, we will brute force FTP service of metasploitable machine, which has IP 192.168.1.101

brute force

We have created in Kali a word list with extension ‘lst’ in the path usr\share\wordlist\metasploit.

share wordlist

The command will be as follows −

hydra -l /usr/share/wordlists/metasploit/user -P 
/usr/share/wordlists/metasploit/ passwords ftp://192.168.1.101 –V 

where –V is the username and password while trying

hydra command

As shown in the following screenshot, the username and password are found which are msfadmin:msfadmin

admin password

Johnny

Johnny is a GUI for the John the Ripper password cracking tool. Generally, it is used for weak passwords.

To open it, go to Applications → Password Attacks → johnny.

johny

In this case, we will get the password of Kali machine with the following command and a file will be created on the desktop.

desktop

Click “Open Passwd File” → OK and all the files will be shown as in the following screenshot.

open file

Click “Start Attack”.

start attack

After the attack is complete, click the left panel at “Passwords” and the password will be unshaded.

unshaded

John

john is a command line version of Johnny GUI. To start it, open the Terminal and type “john”.

unshadowing

In case of unshadowing the password, we need to write the following command −

root@kali:~# unshadow passwd shadow > unshadowed.txt 

Rainbowcrack

The RainbowCrack software cracks hashes by rainbow table lookup. Rainbow tables are ordinary files stored on the hard disk. Generally, Rainbow tables are bought online or can be compiled with different tools.

To open it, go to Applications → Password Attacks → click “rainbowcrack”.

rainbowcrack

The command to crack a hash password is −

rcrack path_to_rainbow_tables -f path_to_password_hash 

SQLdict

It is a dictionary attack tool for SQL server and is very easy and basic to be used. To open it, open the terminal and type “sqldict”. It will open the following view.

sqldict

Under “Target IP Server”, enter the IP of the server holding the SQL. Under “Target Account”, enter the username. Then load the file with the password and click “start” until it finishes.

hash-identifier

It is a tool that is used to identify types of hashes, meaning what they are being used for. For example, if I have a HASH, it can tell me if it is a Linux or windows HASH.

hash identifier

The above screen shows that it can be a MD5 hash and it seems a Domain cached credential.

Next Topic : Click Here

This Post Has 2 Comments

Leave a Reply