1 00:00:02,140 --> 00:00:08,560 So, listen, this year we're going to take a look at this, uh, John, there are two decisions to 2 00:00:08,560 --> 00:00:11,320 crack the password and also the hashes. 3 00:00:11,800 --> 00:00:14,550 And you need to take this pseudo John. 4 00:00:14,800 --> 00:00:23,010 So this is in a system binary and you cannot access this normal user and you need to take the pseudo. 5 00:00:26,150 --> 00:00:27,500 Physical store format's. 6 00:00:35,250 --> 00:00:42,110 So these are the formats, John, the Ripperton brute force are the crack the. 7 00:00:42,930 --> 00:00:44,880 So there will be two modes. 8 00:00:44,880 --> 00:00:48,120 I think there are three mudstone so far, the single malt. 9 00:00:48,120 --> 00:00:55,830 And in the single war, it will require a permit, the user name and use the permutations and combinations 10 00:00:55,830 --> 00:00:58,620 to exact the user name and password. 11 00:00:58,620 --> 00:01:03,060 And then it will take further hashes. 12 00:01:03,240 --> 00:01:08,840 And the second one is, uh, like a word and you need to spread the word to crack the password. 13 00:01:10,110 --> 00:01:12,900 So let's go ahead and do some examples. 14 00:01:13,980 --> 00:01:23,340 So I am at this of so we can just, uh, this is very, very best website for the cryptography and also 15 00:01:23,340 --> 00:01:26,040 like City of and yes, you need to enter the input. 16 00:01:26,430 --> 00:01:30,890 I'm given this and I want to search for Chavan algorithm. 17 00:01:32,980 --> 00:01:40,300 So I'm going just what I want to do is I just drag and drop this one, the this recipe now that function 18 00:01:40,300 --> 00:01:44,380 will be appropriate on this input and we get out of this. 19 00:01:45,790 --> 00:01:51,790 So one thing we need to do is, uh, you need to first I'll put this into. 20 00:01:54,750 --> 00:01:56,150 Are that set to crack? 21 00:01:58,650 --> 00:02:00,030 We are just looking into this. 22 00:02:01,170 --> 00:02:12,090 So we need to say a John, uh, farmer as he calls to rush hour round hyphen Shoven. 23 00:02:15,040 --> 00:02:22,180 So we need to search for this effort, and if we enter, it will try all the combinations and it will 24 00:02:22,180 --> 00:02:22,980 crack the puzzle. 25 00:02:26,350 --> 00:02:33,410 Now it's proceeding with incremental Molaskey, so this is the third type that is incremental more. 26 00:02:36,050 --> 00:02:38,640 And as you can see, we got the protection. 27 00:02:39,290 --> 00:02:44,140 So I would just say, look, it's not a recipe. 28 00:02:45,050 --> 00:02:51,110 So if you did not wish any world, it will take the default list that is stored in the U.S. associate 29 00:02:51,110 --> 00:02:52,480 John Passo Thirsty. 30 00:02:52,850 --> 00:02:57,200 So we have got this little plain text from the shower and. 31 00:02:59,530 --> 00:03:09,270 So in order to try also try this empty fight, so go ahead and let me read this one hour and then it 32 00:03:09,290 --> 00:03:10,290 will drag and drop me. 33 00:03:11,680 --> 00:03:13,180 So now we have got the hash. 34 00:03:13,710 --> 00:03:24,840 Now, you can also do this verification, uh, hash identifier and then paste this hash here and you 35 00:03:24,910 --> 00:03:38,530 get most answers so you can say this is your amplifier and you can just crack this, John, for my easy 36 00:03:38,590 --> 00:03:39,490 calls to. 37 00:03:41,590 --> 00:03:42,630 You know, here in. 38 00:03:45,600 --> 00:03:51,990 So you need to up the pharma tape, which we have lifted from the previous comment formats. 39 00:03:52,650 --> 00:04:01,470 So you two sorry honey, I just, uh, input this hash into this article that dirty. 40 00:04:06,670 --> 00:04:10,300 So now we are going to enter sorry. 41 00:04:17,690 --> 00:04:25,700 So it's using this word to Sergeant John Sodertalje, so we have successfully got the brand that is 42 00:04:25,710 --> 00:04:26,060 Nikil. 43 00:04:26,750 --> 00:04:32,850 And one important thing, this can be used to track the harshness of this seizure of it. 44 00:04:33,080 --> 00:04:40,760 So we have learned from the essentials that it contains the user information, and it will not display 45 00:04:40,760 --> 00:04:47,390 the encrypted password and that the password of the results will be stored in the seizure of it. 46 00:04:47,990 --> 00:04:49,790 That means Surakarta. 47 00:04:51,710 --> 00:04:53,810 It see Shardul. 48 00:04:56,100 --> 00:05:00,270 So these are the users, uh, passwords. 49 00:05:00,600 --> 00:05:07,290 So this is the only the user that is there in this system called and this one is the password of the 50 00:05:07,530 --> 00:05:08,280 card user. 51 00:05:09,000 --> 00:05:18,090 So what I want to do is I can just copy the entire month and see shadow file to the text file rather 52 00:05:18,090 --> 00:05:18,460 than that. 53 00:05:18,510 --> 00:05:21,050 I will use this on the current. 54 00:05:26,890 --> 00:05:32,140 So subtle and shadow and let's see a shot of. 55 00:05:46,450 --> 00:05:51,760 OK, I think we should get the passports. 56 00:05:52,060 --> 00:05:53,920 OK, let's try this on. 57 00:05:54,640 --> 00:05:59,280 I think John will track it, creates the possibility for it to shut off. 58 00:05:59,410 --> 00:06:00,910 It will be in the format. 59 00:06:01,340 --> 00:06:03,910 Uh, that is identical, John. 60 00:06:06,020 --> 00:06:14,170 So as you can see, we got the username and password, so Armatix nice, so you don't need to run that. 61 00:06:14,210 --> 00:06:20,640 And you can just directly past a tee shot of this John Sajani T-shirt. 62 00:06:21,380 --> 00:06:29,770 If you think the ladies are the oldest and you can specify the world using the iPhone woolshed. 63 00:06:32,040 --> 00:06:34,740 So I can say, well, this. 64 00:06:54,470 --> 00:06:55,620 So, Surakiart. 65 00:06:58,170 --> 00:07:04,340 So it has already found the person has so sure it's missing. 66 00:07:06,540 --> 00:07:07,340 Yeah. 67 00:07:12,230 --> 00:07:13,370 I think with this. 68 00:07:20,400 --> 00:07:27,450 So now let us go and specify this to correct that, now it will use the word not. 69 00:07:38,520 --> 00:07:42,510 So I think it's exploding in the rubber tree. 70 00:07:43,550 --> 00:07:54,780 That's why previously we have got it says that one person has so it's floating in this room that under 71 00:07:54,790 --> 00:07:55,140 a tree. 72 00:07:57,000 --> 00:08:04,420 So so another thing is you need you can also crack the password protected your first order first. 73 00:08:04,900 --> 00:08:13,980 All you need to do is you need to send pseudo John forward is equal to a zip. 74 00:08:15,150 --> 00:08:20,220 So before that, what you want to do is you want to run a government currency zone. 75 00:08:21,030 --> 00:08:30,810 So the password and a password set as you file should be possible that this doesn't cover. 76 00:08:31,110 --> 00:08:40,580 So this, John, will accept the hashes from the implausible and you need to start using this redirection 77 00:08:40,590 --> 00:08:41,110 operator. 78 00:08:41,430 --> 00:08:44,430 So that's a sample that hashes. 79 00:08:46,920 --> 00:08:48,630 That's our sample. 80 00:08:49,800 --> 00:08:53,210 So now this sample contains the harshest of this technology. 81 00:08:53,760 --> 00:08:56,980 And then you need to switch the sample file here. 82 00:08:57,390 --> 00:08:58,650 That is the highest order. 83 00:08:59,130 --> 00:09:07,980 And this different then you this done will crack the password for you from the default and then you're 84 00:09:07,980 --> 00:09:11,280 going to enter the end of the password to unzip the four. 85 00:09:12,400 --> 00:09:16,070 So I will leave this task to you to crack the puzzle. 86 00:09:16,170 --> 00:09:20,130 You said the easy password for a file I created. 87 00:09:20,160 --> 00:09:27,700 You file for an automatic teller and put a password and then on one one, will you? 88 00:09:28,120 --> 00:09:33,660 You can just use the default wallet and use the john to crack the password. 89 00:09:37,040 --> 00:09:38,070 So that's all for this year. 90 00:09:38,110 --> 00:09:45,110 I hope we have understood so maybe in the future we may use Don more so.