John The Ripper
This guide contains the answer and steps necessary to get to them for the John The Ripper room.
Table of contents
- Setting up John the Ripper
- Wordlists
- Cracking Basic Hashes
- Cracking Windows Authentication Hashes
- Cracking /etc/shadow Hashes
- Single Crack Mode
- Custom Rules
- Cracking Password Protected Zip Files
- Cracking Password Protected RAR Archives
- Cracking SSH Keys with John
Setting up John the Ripper
- What is the most popular extended version of John the Ripper?
Click for answer
Jumbo John
Wordlists
- What website was the rockyou.txt wordlist created from a breach on?
Click for answer
rockyou.com
Cracking Basic Hashes
- What type of hash is hash1.txt?
The types can all be found using hash-identifier
.
Click for answer
MD5
- What is the cracked value of hash1.txt?
The correct format here is raw-md5
.
Click for answer
biscuit
- What type of hash is hash2.txt?
Click for answer
- What is the cracked value of hash2.txt
The correct format here is raw-sha1
.
BASIC 2 VALUE
Click for answer
kangeroo
- What type of hash is hash3.txt?
Click for answer
SHA256
- What is the cracked value of hash3.txt
The correct format here is raw-sha256
.
Click for answer
microphone
- What type of hash is hash4.txt?
After testing, SHA-512 didn't seem to work.
Click for answer
Whirlpool
- What is the cracked value of hash4.txt
The correct format here is whirlpool
.
Click for answer
colossal
Cracking Windows Authentication Hashes
- What do we need to set the "format" flag to, in order to crack this?
As the name comes from NTHash, 'NT' might be a first guess. Looking at the available formats we can see this is indeed the case.
Click for answer
NT
- What is the cracked value of this password?
We can use the following command with John to crack the NTLM hash.
Click for answer
mushroom
Cracking /etc/shadow Hashes
- What is the root password?
For this question we can do multiple things. One is to simple copy the hash into a separate file and crack it with John. Or we can split the entries into their respective files and with unshadow
create a single file we can use in John. For now I will use the latter method.
This gives us one file with the hash and username.
Click for answer
1234
Single Crack Mode
- What is Joker's password?
First we need to add the username in front of the hash, then we can use Johns single mode cracking.
Click for answer
Jok3r
Custom Rules
- What do custom rules allow us to exploit?
This answer can be found in the text.
Click for answer
password complexity predictability
- What rule would we use to add all capital letters to the end of the word?
Using the information from the text we can get the answer.
Click for answer
Az"[A-Z]"
-
What flag would we use to call a custom rule called "THMRules"
This can be found in the text.
Click for answer
--rule=THMRules
Cracking Password Protected Zip Files
- What is the password for the secure.zip file?
We first use zip2john
to get a hash and then pass that through to john.
Click for answer
pass123
- What is the contents of the flag inside the zip file?
Click for answer
THM{w3ll_d0n3_h4sh_r0y4l}
Cracking Password Protected RAR Archives
- What is the password for the secure.rar file?
We first use rar2john
to get a hash and then pass that through to john.
Click for answer
password
- What is the contents of the flag inside the zip file?
Click for answer
THM{r4r_4rch1ve5_th15_t1m3}
Cracking SSH Keys with John
- What is the SSH private key password?
We first use ssh2john
to get a hash and then pass that through to john.
Click for answer
mango