

Now run John with a wordlist and tell it to generate rules from the wordlist john -wordlist=/usr/share/wordlists/500-worst-passwords.txt -rules r00tmypasswd These 4 accounts each have a password that is the same as the username. Use the "-show" option to display all of the cracked passwords reliablyīingo! We have already compromised 4 accounts. Loaded 7 password hashes with 7 different salts (md5crypt, crypt(3) $1$ ) Use the "-format=aix-smd5" option to force loading these as that type instead Warning: detected hash type "md5crypt", but the string is also recognized as "aix-smd5" The procedure for using John is to start in single mode:

Now you can run John the Ripper on the file mypasswd. Unshadow r00tpasswd r00tshadow > r00t4john


To turn an /etc/shadow file into a normal unix password file, use the unshadow utility (from John the Ripper): Only users with a password hash can log in (if there is a * or a !, they cannot log in). The most important are the first two: username and password hash. In this file, there are multiple fields (see Reading /etc/shadow page on the wiki for help reading the /etc/shadow file). Unix stores information about system usernames and passwords in a file called /etc/shadow.
