1 00:00:00,660 --> 00:00:03,120 So now let's get into the John the Ripper module. 2 00:00:04,020 --> 00:00:12,510 It's used to identify weak passwords that have been acquired as Hashd files or raw landmen and TLM hashes 3 00:00:13,230 --> 00:00:15,750 by using the hashtag command and interpreter. 4 00:00:17,230 --> 00:00:21,970 The goal of this module is to find trivial passwords in a short amount of time. 5 00:00:23,370 --> 00:00:32,730 The crack complex passwords or use large word lists, John, the river should be used outside of Métis 6 00:00:32,730 --> 00:00:33,030 Boy. 7 00:00:34,390 --> 00:00:36,310 So search the term JTR. 8 00:00:40,830 --> 00:00:44,820 Let's use here the second module, JTR, crack fast. 9 00:00:46,120 --> 00:00:47,650 So it's jus Emmanuel. 10 00:00:48,830 --> 00:00:55,070 Use auxillary Analise JTR Krak fast. 11 00:00:56,090 --> 00:00:58,610 Show me the options, as always. 12 00:01:00,440 --> 00:01:02,450 OK, so here there's nothing to configure. 13 00:01:03,510 --> 00:01:11,250 But there is a variable named Hughs creds which enables cracking the hashes in the credit table. 14 00:01:12,680 --> 00:01:14,420 So, OK, that's run the module. 15 00:01:17,510 --> 00:01:22,970 Now depends on hashes and the computation of your computer, it might take a two or three minutes. 16 00:01:24,130 --> 00:01:25,060 Now, it's already finished. 17 00:01:26,560 --> 00:01:28,630 So let me look at the KRED stable again. 18 00:01:30,370 --> 00:01:30,830 Excellent. 19 00:01:31,120 --> 00:01:33,250 The trivial hashes are hacked.