I’d be fascinated to know you bypassed the need for John (or some equivalent tool) on this box.
Happy to discuss in private if that is easier.
Probably the best hint I can give: given anyone who uses john, should know why they actually do that step, just know you can do that same thing you are trying to achieve without ever needing john… but even that seems almost like a redundant explanation: cause the reason anyone would grab for john, ‘is’ because they already know about this principle in the first place. It then may take some time to read up on the ‘how’, but still…
Point is: forget john, open a manual before you open john and you should pretty much find what you are looking for on the first page.
Then again, to place this in a perspective of reality: although it’s simple in the end, I’m new to this and it took me about 2 days to turn this machine inside out. So no harm if you spend some time figuring it all out: it’s worth it.
Point is: forget john, open a manual before you open john and you should pretty much find what you are looking for on the first page.
I think I need to PM you about this because there is something I simply dont get here.
The thing you need to use John for is a fundamental control to prevent misuse of the thing itself. If you can trivially bypass it then either there is something I’ve completely misunderstood (often the case) or a few assumptions over the years have been badly made.
If the thing can be used without unlocking it, the lock is pointless and that should be true everywhere.
Im pretty stuck right now. I got first user no problem. Found the interesting files, managed to curl them and got the stuff for John. Converted it to something John can read but he still never cracks it for me. Any nudges would be appreciated
Im pretty stuck right now. I got first user no problem. Found the interesting files, managed to curl them and got the stuff for John. Converted it to something John can read but he still never cracks it for me. Any nudges would be appreciated
Check the following:
the file is in the correct format
you are using the right options for john
john hasn’t cracked it but decided to hide it from you (--show).
Alternatively try the Magnum Ripper version - its a bit more stable.
Can anyone give me a little help? I discovered my weakness is enumeration because I’m stuck with www data
To get around in a Linux system you need a username and some sort of credentials. See if you can find potential usernames.
If you have found anything remotely interesting, have you tried to utilize it in some way? See if you can find credentials.
You only need ‘cat’ and ‘ls’ command at this stage. Until you find some username and credentials, then you need an additional tool to test your findings.
Do you use any scripts to help with your enumeration ?
john hasn’t cracked it but decided to hide it from you (–show).
Alternatively try the Magnum Ripper version - its a bit more stable.
I’m 99% sure it’s in the correct format, I run the file that I curl for through ssh2**** and then feed that john. When I run john I specify the most common word list and the format. When I run --show i get “0 password hashes cracked, 1 left”
I’m 99% sure it’s in the correct format, I run the file that I curl for through ssh2**** and then feed that john. When I run john I specify the most common word list and the format. When I run --show i get “0 password hashes cracked, 1 left”
@hrevans i had the same issue, i just added some thing like /h**e/ at the beginning of the file provided by ssh2**** and it works like a charm. btw it’s my firs user
i hope this helpful
I read a lot of “John” here, but uncle john isn’t needed.
Many ways to skin a cat, but using John here is like trying to explode the door of a safe, when the window right next to it is open…
Hi, Ive rooted the box earlier but not the john-route. Today I went back and want to manage to get in that way, but johns answer seems to be incorrect? DM me if you have any nudge/comment on that?
I’d be fascinated to know you bypassed the need for John (or some equivalent tool) on this box.
Happy to discuss in private if that is easier.
It is technically possible to do this without the need for john, but the chance to break the server for everyone in the process is pretty good.
It is technically possible to do this without the need for john, but the chance to break the server for everyone in the process is pretty good.
Not sure what you have in mind, but what I talk about is completely safe and much easier than using john: it takes about zero effort and resources to do it.
It is technically possible to do this without the need for john, but the chance to break the server for everyone in the process is pretty good.
You alter the box, which is bad, I agree. It might confuse other users, and provide unneccessary rabbitholes. So you better clean up after yourself fast, and probably do it in the vip-tier where you have the box for yourself.
BUT you dont break anything for other users if you know what you are doing :). add instead of replace.
You alter the box, which is bad, I agree. It might confuse other users, and provide unneccessary rabbitholes. So you better clean up after yourself fast, and probably do it in the vip-tier where you have the box for yourself.
BUT you dont break anything for other users if you know what you are doing :). add instead of replace.
The path I talk about adds and breaks nothing and allows for cleanup just as well, leaving all in tact that is, creating no other holes.