InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How to use John the Ripper to crack passwords

Presented by

Ed Moyle, Drake Software

About this talk

The open source John the Ripper password cracker is a key tool for red and blue team members alike. Red teams use it to gain access to systems and blue teams use it to detect weak passwords and test defenses. In this video, Ed Moyle of Drake Software explains how to use John the Ripper to crack Linux and Windows passwords, as well as passwords encrypted with an SSH key. Editor's note: Password cracking tools can be used lawfully and unlawfully. It is up to you to ensure your usage is lawful. Get appropriate permission and approval prior to attempting to use any password cracker, and handle the information obtained ethically. If you are unsure whether your usage is lawful, do not proceed until you have confirmed that it is -- for example, by discussing and validating your planned usage with your organization's counsel.
Eye on Tech

Eye on Tech

226 subscribers92 talks
Insights and commentary on the latest in business technology.
Eye on Tech focuses on the latest business technology and IT topics, including AI, DevOps, security, networking, cloud, storage and more. Programmed strategically to inform the business tech buying cycle, Eye on Tech features insight and commentary from the writers, editors and experts in the TechTarget portfolio.
Related topics