1 00:00:00,210 --> 00:00:04,380 In this lecture, we are going to see how we can crack, zip and draw passwords. 2 00:00:06,360 --> 00:00:09,090 First of all, let's see how we can grab the files. 3 00:00:12,580 --> 00:00:15,940 The build up to the archive links. 4 00:00:16,059 --> 00:00:20,110 Right click to the file and click Create Archive to set a password. 5 00:00:22,960 --> 00:00:24,160 Open the terminal. 6 00:00:24,190 --> 00:00:26,920 Get the hash of the document with the given command. 7 00:00:27,820 --> 00:00:30,330 They put on great mentorship into. 8 00:00:35,370 --> 00:00:42,130 Mentorship is a password protected file is a text file that will contain a hash that is required to 9 00:00:42,130 --> 00:00:42,760 be correct. 10 00:00:47,070 --> 00:00:47,370 Greg. 11 00:00:47,370 --> 00:00:48,720 The password with John. 12 00:00:49,860 --> 00:00:53,730 You can use the command on the SJW as your text. 13 00:00:54,940 --> 00:00:58,300 We are going to crack the hash with the default dictionary. 14 00:00:59,770 --> 00:01:02,770 Once the password is cracked, it will be displayed on screen. 15 00:01:05,600 --> 00:01:07,960 Now let's see how we can crack the files. 16 00:01:08,000 --> 00:01:08,690 Password. 17 00:01:10,210 --> 00:01:12,730 We are going to crack the password on windows. 18 00:01:13,180 --> 00:01:16,380 First of all, prepare a password protected archive. 19 00:01:17,620 --> 00:01:22,000 Right click the file and click Add to create archive and set a password. 20 00:01:25,550 --> 00:01:29,060 Copy the file to John slash folder in Windows. 21 00:01:33,140 --> 00:01:38,750 Open the command terminal in the same folder and get the hash of the document with the following command. 22 00:01:42,940 --> 00:01:46,150 We'll use John to crack the password with the given command. 23 00:01:46,180 --> 00:01:56,320 John W is equal to all the text we are using to text dictionary in our attack, which must be present 24 00:01:56,320 --> 00:01:57,250 in your folder. 25 00:01:59,920 --> 00:02:01,170 Was the password is correct. 26 00:02:01,180 --> 00:02:02,350 It will be displayed. 27 00:02:07,940 --> 00:02:10,190 No, let's try cracking passwords. 28 00:02:10,190 --> 00:02:14,270 The dashcam, which is much faster if you have good tip use. 29 00:02:16,350 --> 00:02:16,450 No. 30 00:02:16,570 --> 00:02:19,350 Copy the file back to the directory. 31 00:02:20,820 --> 00:02:25,020 Now open the store text file and remove the file name from contents. 32 00:02:28,110 --> 00:02:31,800 I'll open the bar shell and use the given command to correct the handshake. 33 00:02:33,420 --> 00:02:36,990 They are treating it as the hash that is are five password. 34 00:02:36,990 --> 00:02:38,040 That is to be correct. 35 00:02:41,490 --> 00:02:43,380 Let's now move to the demonstration. 36 00:02:48,500 --> 00:02:50,450 So we are on your call box. 37 00:02:50,630 --> 00:02:53,660 Right click a file and click Create archive. 38 00:02:55,240 --> 00:02:56,230 I've got a name. 39 00:02:57,090 --> 00:02:58,230 Select the zip. 40 00:03:00,090 --> 00:03:02,520 Go to other options and set a password. 41 00:03:15,740 --> 00:03:16,130 No. 42 00:03:16,130 --> 00:03:16,550 Open the. 43 00:03:19,070 --> 00:03:22,090 Use it to join command to obtain the hash. 44 00:03:24,880 --> 00:03:27,310 You can check the hash with nano command. 45 00:03:32,300 --> 00:03:34,610 You can see that our hash has been obtained. 46 00:03:39,710 --> 00:03:40,610 To close it. 47 00:03:42,080 --> 00:03:43,490 Open the terminal again. 48 00:03:51,390 --> 00:03:51,960 No use. 49 00:03:51,960 --> 00:03:55,030 Don't crack the password for deflationary. 50 00:04:03,330 --> 00:04:05,820 And here you can see that our password has been correct. 51 00:04:07,860 --> 00:04:08,100 No. 52 00:04:08,100 --> 00:04:12,410 Let's see the methodology to get our passwords on the Windows machine. 53 00:04:12,420 --> 00:04:15,510 Right click a file and click add to archive. 54 00:04:17,040 --> 00:04:18,630 Select the option to set password. 55 00:04:20,579 --> 00:04:23,040 Give it a password and click okay. 56 00:04:30,250 --> 00:04:30,470 No. 57 00:04:30,490 --> 00:04:33,040 Copy the archive to the John-John folder. 58 00:04:35,640 --> 00:04:38,310 We already have to traditionally in order. 59 00:04:44,840 --> 00:04:49,070 Type cmd in the address bar and open command prompt in the same folder. 60 00:04:51,960 --> 00:04:54,930 Door to door utility will obtain the hash. 61 00:05:06,700 --> 00:05:10,450 You can open your text file and see that hash has been updated. 62 00:05:15,720 --> 00:05:17,790 No use on the password. 63 00:05:25,710 --> 00:05:27,150 The password has been updated. 64 00:05:30,600 --> 00:05:31,110 Bracketed. 65 00:05:31,200 --> 00:05:31,950 hashCode. 66 00:05:31,980 --> 00:05:33,840 Copy the text file. 67 00:05:34,290 --> 00:05:35,430 Whereas get folder. 68 00:05:41,520 --> 00:05:45,260 Open it and remove the file name from the. 69 00:05:47,960 --> 00:05:48,890 Save the file. 70 00:05:55,060 --> 00:05:57,280 No open bar shell in the same folder. 71 00:06:00,800 --> 00:06:02,180 Before starting the attack. 72 00:06:02,210 --> 00:06:04,160 Let's first see how scared Vicki. 73 00:06:05,970 --> 00:06:09,210 Here you can see a lot of codes for different file types. 74 00:06:10,520 --> 00:06:15,860 Your search for are five and we can see that 13,000 is the code that we are targeting. 75 00:06:20,340 --> 00:06:22,350 Use the command as shown on the screen. 76 00:06:27,620 --> 00:06:30,090 They do not use data and it flags. 77 00:06:30,110 --> 00:06:34,310 I have used them because it helps me to use my graphics card on my machine. 78 00:06:34,760 --> 00:06:40,220 And you can see that hash card has started with destroying all the entries from your dictionary. 79 00:06:41,410 --> 00:06:41,770 It was. 80 00:06:41,770 --> 00:06:42,710 The password is found. 81 00:06:42,730 --> 00:06:43,870 It will be displayed. 82 00:06:47,210 --> 00:06:52,100 You can close the terminal and open door to testify and to see the password.