GMU John the Ripper Password Auditing Program Discussion

User Generated


Computer Science

George Mason University


In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach (brute-force attack) is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a forgotten password (though installing an entirely new password is less of a security risk, but involves System Administration privileges), to gain unauthorized access to a system, or as a preventive measure by System Administrators to check for easily crackable passwords. On a file-by-file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.


John the Ripper (JtR) is a well-known password auditing program. Use JtR to crack sample passwords provided in the project.


  1. Read and execute the instructions for Hands-on Project 1 starting on page 274.
  2. Write a paper describing your experience and project results. Describe challenges you encountered.

Unformatted Attachment Preview

9:42 24 A 5.12 Conclusion n TI c Hands-on Projects iiii Project 1 Q One of the most well- 60 D known password auditing programs is John the Ripper® (JtR) written by Solar Designer (Alexander Peslyak). You can read all about it and get a free copy from It has been used for years and has proven to be both robust and easy to AA used for many use. In this project, you are < ig to run JtR in a Hide > command nrnmnt (DOS). 9:42 4 IN Hands-on Proje... พ a In this project, you are going to run JtR in a command prompt (DOS). You are going to perform both a dictionary attack and a brute-force attack on a sample password file you will download from this book's companion website. Q @ 1 1. Make a folder labeled “security” on AA your C: drive (C:\security V). 2. Download JtR from /john/. 3. Scroll down and click on the link Hide < labeled John the > Ripper 1.9.0 (64-bit W 9:42 Hands-on Proje... พ c 3. Scroll down and click on the link iiii labeled John the Ripper 1.9.0 (64-bit Windows binaries). (Download the latest version available.) Q @ 4. Click Save. um 5. Select your C:\security folder. (If you haven't already created this folder, you will need to do so now.) AA 6. If the program doesn't automatically open, browse to C:\security Hide < 7. Right-click john- > 1.9.u-jumbo-1- 9:42 4 Hands-on Proje... Σ c iiii 7. Right-click john- 1.9.0-jumbo-1- (If a later version is available, this file may have a slightly different name.) Q @ 8. Select Extract All and Extract. um 9. Download the sample password database labeled AA "hackme.txt" from www.pearsonhigher . (The files may be listed under Companion Website, Chapter 5, and Student Project Files. This is the fil Hide < > containing a list o. 9:42 4 Hands-on Proje... 口 A c Files. This is the file iiii containing a list of sample password hashes.)
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.



Course code:



The security of data to most individuals and organizations is a significant priority.
Different techniques are being implemented to ensure the safety of data (Valaboju, 2021, p. 8).
Once a piece of crucial information belonging to an organization falls into the hands of people
with bad intentions, in most cases, they tend to either forge or modify the data for amusement or
personal gains, and this is a step most organizations are not will...

Awesome! Made my life easier.


Related Tags