This project explores password cracking using John the Ripper (JtR) in a Windows environment.
A test password hash file (pass1.txt) was created, and different cracking modes were tested:
- Incremental brute-force attack: Tried all possible combinations (slow).
- Dictionary attack: Used a custom wordlist (
mypass.txt) and successfully cracked the weak passwordsecret123within seconds.
π The experiment shows how weak/common passwords can be cracked easily, highlighting the importance of strong, unique, and complex passwords.
- John the Ripper (Community Edition 1.9.0-jumbo) β Main tool for password cracking
- Windows 10 Command Prompt β Environment for execution
- Hash File (
pass1.txt) β Test password hashes - Custom Wordlist (
mypass.txt) β Password guesses for dictionary attack - Text Editor (Notepad) β Created/edit hash and wordlist files
- Hash Preparation β Create
pass1.txtto store password hashes - Wordlist Creation β Custom wordlist
mypass.txtwith weak/common passwords - Run JtR Modes
- Incremental mode (brute force)
- Dictionary mode (custom wordlist)
- Rule-based hybrid attacks
- Verification of Results β Using
john --show
- Supports multiple hash types (MD5, SHA, bcrypt, etc.)
- Hybrid attacks with rules to mimic real-world cracking
- Cracked results stored in
.potfile - Benchmarking (
john --test) to measure performance - CPU & GPU acceleration support
- Helps identify weak passwords to enforce stronger policies
john --format=raw-md5 --wordlist=mypass.txt pass1.txtβ Output:
?:secret123
1 password hash cracked, 0 left
john --show --format=raw-md5 pass1.txtOutput:
?:secret123
1 password hash cracked, 0 left
| Attack Mode | Cracked Passwords | Time Taken |
|---|---|---|
| Dictionary (Custom Wordlist) | secret123 | Very Fast |
| Incremental (Brute Force) | Attempted (slow) | Long |
| Rule-based Hybrid | Modified words | Moderate |
- Understood how password hashes (MD5) are stored & cracked
- Learned to use JtR in multiple modes (dictionary, brute force)
- Gained practical skills in creating & using custom wordlists
- Saw why weak/common passwords are dangerous
- Realized the importance of strong password policies
- John the Ripper successfully cracked weak passwords.
- Dictionary attacks were fast and effective.
- Incremental brute-force worked but was slow and resource-intensive.
- The cracked password
secret123shows the danger of using weak passwords.