Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to crack the Linux user password by John the Ripper

2025-04-03 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

This article mainly introduces "John the Ripper how to crack Linux user password". In daily operation, I believe many people have doubts about how John the Ripper cracked Linux user password. Xiaobian consulted all kinds of materials and sorted out simple and easy-to-use operation methods. I hope it will be helpful for you to answer the doubt of "John the Ripper how to crack Linux user password". Next, please follow the editor to study!

First, create a user (e.g. zhangsan) in the linux system and set a simple password (e.g. 123) and a complex password

Set a simple password: 123

Copy to / home/shadow2 after changing the password

Set complex password: huangzexin123

Copy to / home/shadow3 after changing the password

Copy password:

Then run John the Ripper and choose different ways of cracking (simple, dictionary, enhanced) to crack the linux user password.

Simple:

Dictionary:

3. Enhancement

Draw the interface with characters:

1. Select shadow

Select a method:

Click the icon

View the result

At this point, the study on "how to crack the Linux user password by John the Ripper" is over. I hope to be able to solve your doubts. The collocation of theory and practice can better help you learn, go and try it! If you want to continue to learn more related knowledge, please continue to follow the website, the editor will continue to work hard to bring you more practical articles!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report