PRESENTED BY: SHWETA SHARMA
A. SOCIAL ENGINEERING
B. SHOULDER SURFING
C. GUESSING PASSWORDS
H
I
G
H
-
T
E
C
H
M
E
T
H
O
D
S
 John the Ripper
 Hashcat
 Cain and Abel
 Hydra
 Rainbow Crack
 Brutus
 Medusa
 OphCrack
 Brute force and dictionary
 Modes
Single wordlist
Incremental
 Working of John the ripper
i. Open John in Kali Linux
ii. Open John in Kali Linux
iii. TYPE- “man john” in terminal
iv. ADD USER
v. ADD USER
vi. WORDLIST AND COPY OF SHADOW FILE
vii. SHADOW FILE
viii. LOGIN SCREEN
 Fastest CPU-based tool
 Modes
Straight Toggle-Case Brute force
Combination
 Working of Hashcat tool
OPEN HASH CAT TOOL
SYNTAX OF HASHCAT TOOL
HASH TYPES
ATTACK MODES
WEBSITE TO GET HASH
STORED HASH IN HASH FILE
PASSWORD LIST
PASSWORDS CRACKED BY HASHCAT
 Salt hash
 Fast
 Flexible
hashcat –a 3 hash.txt ?u?l?l?l?d?d
 Recovers Passwords
Dictionary
Brute-force
Cryptanalysis
 Features
 Password guessing
 Password Security
 No exploitation of vulnerability
CAIN TOOL
CAIN TOOL
NTLM HASH
IMPORT HASH FROM SYSTEM
APPLY DICTIONARY ATTACK
ADD DICTIONARY TO LIST
PRESS START
PASSWORD RECOVERED
 Establish strong password
 Do not use dictionary words
 Password age
 Stronger authentication method
 Updated system
 Different passwords
 Use punctuation characters
 Do not rely on similar looking
characters 3 --- E , 5 --- S , ! --- 1
 Do not share passwords
 Avoid storing passwords in an unsecured
location
 Do not use personal information like date
of birth, pet names.
 Failed login attempts
Use strong passwords and enforce a strong
password creation policy
password cracking using John the ripper, hashcat, Cain&abel

password cracking using John the ripper, hashcat, Cain&abel