1 00:00:01,350 --> 00:00:06,240 In this lecture, we are going to see how we can crack office passwords on Windows. 2 00:00:06,720 --> 00:00:10,080 We will be able to take our word Excel and PowerPoint password. 3 00:00:10,260 --> 00:00:10,920 This method. 4 00:00:12,180 --> 00:00:15,000 We've already seen the editorial on Lennox. 5 00:00:15,900 --> 00:00:20,940 But running John on Windows is somewhat tricky as different modules of John are written in different 6 00:00:20,940 --> 00:00:21,660 languages. 7 00:00:21,780 --> 00:00:27,480 That's why we have installed Python along with John as most of the module written in Python. 8 00:00:30,290 --> 00:00:32,180 Though the concept of tracking is same. 9 00:00:32,330 --> 00:00:35,900 First, get the hash from the file and then crack the hash with John. 10 00:00:37,210 --> 00:00:40,960 For this tutorial we are going to prepare a password protected PowerPoint file. 11 00:00:41,140 --> 00:00:42,970 Save the word file in windows. 12 00:00:43,060 --> 00:00:47,470 We can give it a password by going to the general option and selecting a password. 13 00:00:48,350 --> 00:00:48,460 No. 14 00:00:48,600 --> 00:00:51,060 Copy the file to the zone folder in Windows. 15 00:00:55,580 --> 00:00:55,880 No. 16 00:00:55,880 --> 00:00:58,940 We need to open command prompt in the same folder. 17 00:01:00,230 --> 00:01:02,590 And get the hash of the document. 18 00:01:02,600 --> 00:01:05,390 You can use the command as shown on the screen here. 19 00:01:05,390 --> 00:01:11,570 We need to provide the full link of Python executable, which is C python 27 in our case. 20 00:01:11,840 --> 00:01:18,620 And then we are going to write office to PI as the module is written in Python and then the file name 21 00:01:18,620 --> 00:01:24,590 and then the file where we want to store our hash, which is hash dot text in our case. 22 00:01:30,830 --> 00:01:36,200 Once we have hash or hashed or text file, we can use the command as shown on the screen to get the 23 00:01:36,200 --> 00:01:36,830 password. 24 00:01:39,120 --> 00:01:43,230 For this tutorial we are going to use the tag conditionally. 25 00:01:46,390 --> 00:01:49,300 Then once the password is correct, it will be shown on the screen. 26 00:01:54,530 --> 00:01:58,880 Who see the crack passwords we can run on again with the flag. 27 00:02:00,040 --> 00:02:02,130 And our passwords will be shown on the screen. 28 00:02:04,610 --> 00:02:06,830 So let's actually crack some passwords. 29 00:02:10,310 --> 00:02:12,800 First of all, create a PowerPoint file in Windows. 30 00:02:15,960 --> 00:02:16,230 Right. 31 00:02:16,230 --> 00:02:17,400 Some content in it. 32 00:02:19,980 --> 00:02:22,470 And save it for while saving it. 33 00:02:22,470 --> 00:02:25,830 Go to the general options and give it a password to open. 34 00:02:32,370 --> 00:02:35,730 Re-enter the password and click okay and then save the file. 35 00:02:45,110 --> 00:02:47,270 To check whether a password has been applied. 36 00:02:47,390 --> 00:02:51,500 Double click the file to open it and you can see that it is password protected. 37 00:02:52,580 --> 00:02:53,270 Close it. 38 00:02:53,990 --> 00:02:56,450 Copy the file to the zone folder in windows. 39 00:03:08,410 --> 00:03:10,690 Open the command, prompt the same directory. 40 00:03:13,250 --> 00:03:19,070 You can open the command com in the same directory by simply typing cmd in the address bar and press 41 00:03:19,070 --> 00:03:19,670 enter. 42 00:03:21,980 --> 00:03:25,850 And you can see that command prompt has been opened while in the same directory. 43 00:03:27,580 --> 00:03:27,910 No. 44 00:03:27,910 --> 00:03:30,630 We need to know the exact part of Python executable. 45 00:03:31,800 --> 00:03:33,810 Let's see where we every dollar python. 46 00:03:35,350 --> 00:03:41,500 You can go to computer, see, and here you can see that our python is installed in Python 27 directory. 47 00:03:46,210 --> 00:03:50,620 Come back to command prompt and write complete path of python executable. 48 00:03:52,360 --> 00:03:58,980 Followed by offers to join the utility, the target file name and the text file name that will store 49 00:03:58,990 --> 00:03:59,860 our hash. 50 00:04:01,510 --> 00:04:02,570 It was done. 51 00:04:02,600 --> 00:04:08,540 You can go back to the old directory, open the text file, and you can see the hash of our document. 52 00:04:13,720 --> 00:04:13,940 No. 53 00:04:14,050 --> 00:04:15,130 Crack the password. 54 00:04:15,500 --> 00:04:20,440 Traditionally just use the command, John, with the word list parameter. 55 00:04:26,410 --> 00:04:29,590 This press enter and loan will start clicking the password. 56 00:04:32,300 --> 00:04:34,910 Once the password is crack, it will be shown on screen. 57 00:04:41,980 --> 00:04:47,760 If you want to see all your passwords, you can run the John Command again, which hopefully. 58 00:04:50,730 --> 00:04:56,220 So in this lecture we saw how we can run down on windows and crack some office passwords. 59 00:04:58,910 --> 00:05:02,330 I hope you like this lecture and see you in the next lecture.