THT DUYURU

chat
ugursuz reklam
takipci
Seçenekler

Cracking Password of Encrypted PDFs @ @

Provido - ait Kullanıcı Resmi (Avatar)
Deneyimli Çevirmen
Üyelik tarihi:
10/2015
Mesajlar:
145
Konular:
64
Teşekkür (Etti):
42
Teşekkür (Aldı):
71
Ticaret:
(0) %
0
508
bir Hafta önce
#1


Hello, dear TurkHackTeam members;

In this article, I am going to talk about cracking passwords set in pdf files with the help of John tool for security reasons. First, let’s talk a little about the logic of John tool and how it decrypts files in pdf format;



What is John Tool?

The John tool is actually a 115 MB tool created a collection of many different tools. It has several sub-tools for getting passwords in many platforms (Telegram, PDF etc). Today, we will take action in this topic by using pdf2john.py tool.




What is logic? How does it work?

The logic is quite simple; this tool uses a very large wordlist of its own and it saves you the trouble of creating wordlist. If it doesn’t get a result of the scans it does with wordlist, it starts the combinations of letters, numbers and special characters and tries an unlimited combinations. So we understand from here that; cracking the password varies depending on the security of the password and the speed of our system.


(This topic was prepared using the KaliLinux 2020.2 operating system.)




So let’s begin.

1 -
1- Let’s open a new command line and switch to desktop.

Kod:
cd Masaüstü/



2 -
2- First, let’s update our warehouse directory, so it will be easier to access the most up-to-date tools and it will be prevented from getting error when using the tools. Let’s update our warehouse directory immediately.

Kod:
apt update




3 -
3- Let’s install the necessary package for our tool to work.


Kod:
apt install libssl-dev




4 -
4- Let’s start downloading our John tool via GitHub.

Kod:
git clone https://github.com/magnumripper/JohnTheRipper.git




5 -
5- When the download is complete, our tool will be installed on the desktop. First, let’s switch to the directory of our tool.

Kod:
cd JohnTheRipper/




6 -
6- Let’s get access to the run directory that we are going to process inside our John tool.

Kod:
cd run/


7 -
7- This is our most important step; with our perl command, we will give our tool work command through perl. After the perl command, first we write the path of the .pdf file that we want to crack the password then we leave space and after typing “>” (without quotation marks) we leave another space again and after writing the name of the cracked password in which format (I recommend using .txt) and where to register, we run our tool.

Kod:
perl pdf2john.pl /root/Masaüstü/sifrelenmisdosya.pdf > /root/Masaüstü/sifre.txt


8 -
8- When the operation is complete, the directory that we specify is the one with the name that we specify .txt file will be created. (As I mentioned at the beginning of the issue, the duration of the process varies depending on the security of the password and the performance of your system.) But when accessing the generated .txt file, we will receive a hash. Let’s solve this again with our John tool.




9 -
9- The directory where John is installed is the desktop, so let’s switch back to the desktop.

Kod:
cd ../../

10 -

10- Let’s start our John tool again and let’s make our tool access to the file in .txt format where the password was previously saved. After waiting for a while, the tool will reflect the decoded version of hash. The password was found as “123456”, as seen in our example.

Kod:
john sifre.txt






I hope it has been a useful topic; I wish you all peace, healthy and happy days.

TurkHackTeam.Net/Org



Source: https://www.turkhackteam.org/kriptog...masi-john.html
---------------------
P4RS, burak513165, M3m0ry Teşekkür etti.

Bookmarks


« Önceki Konu | Sonraki Konu »
Seçenekler