Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
WPAPCAP2John ( standalone )
#1
Requested from the TinyPaw forum:

http://tinypawlinux.x10.bz/forum/showthread.php?tid=30

Entire John-The-Ripper-1.8.0.13-jumbo-1-bleeding compiled however wpapcap2john was wrapped as an individual standalone extension - extracting the wpapcap2john executable to the (/usr/local/bin/) directory upon startup.

wpapcap2john as well as entire JTR will be included by default in the next TinyPaw build release.

What is (JTR)?

"
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), Windows, DOS, BeOS, and OpenVMS (the latter requires a contributed patch). Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos/AFS and Windows LM hashes, as well as DES-based tripcodes, plus many more hashes and ciphers in "community enhanced" -jumbo versions and/or with other contributed patches.
"

Quoted from the project github: https://github.com/magnumripper/JohnTheRipper

SourceForge:

wpapcap2john.tcz

BitBucket:

wpapcap2john.tcz

Installation:

1.) Download the wpapcap2john extension from either above repository.

2.) Copy or cut your downloaded extension to your (*/tce/optional/) directory.

3.) Open your "onboot.lst" file located in your (*/tce/) directory an make the following changes:

- Add line item: wpapcap2john.tcz

*make sure to include one extra empty(white) line at the bottom of your onboot.lst*

4.) Save the changes you've made by either "file+save" or "cntl+s" and close your text editor.

5.) Close all windows and reboot your system.

6.) Upon reboot wpapcap2john will loaded into the "bin" and accessible from your terminal/cli.

7.) Usage:

Open your terminal/cli and enter the following string:

sudo wpapcap2john --help

*for available options and help*
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)