![john the ripper sha512 john the ripper sha512](https://i1.wp.com/okankurtulus.com.tr/wp-content/uploads/2019/02/foto4.jpg)
From this, I was able to crack 10 passwords. I had separated the hashes into distinct hash files and then ran through JtR. The cracking methodology that I used was to combine each directory section of the SecLists/Passwords wordlists into a single text file, which resulted in 10 distinct text files.
John the ripper sha512 password#
Method: Password wordlist taken from Daniel Miessler’s 10 million password list on github and used hashcat with straight attack with the combinator rule.
![john the ripper sha512 john the ripper sha512](https://1.bp.blogspot.com/-qf3nuF6ehDg/XuFY3gSFspI/AAAAAAAAHAg/7acAC-Dk9eQh0IwZK03IJibUMr0PocwIwCNcBGAsYHQ/s1600/john-show-passwords-cracking-linux.png)
Method: Password wordlist taken from Daniel Miessler’s 10 million password list on github and used John the Ripper wordlist method of cracking the password
John the ripper sha512 cracked#
Strategies used by students who cracked 6 or more passwords: To earn all 10 / 10 points for the lab, students had to crack 6 or more passwords. (NTLM) yogibear: iX ?9LLoAR)8lfQ => 0 student cracked this.(NTLM) blackbear:VSndaLOa => 0 student cracked this.(NTLM) cindybear:secret => 4 students cracked this.(SHA512) teddybear:aoJr0.2*Gf => 0 student cracked this.
![john the ripper sha512 john the ripper sha512](https://miloserdov.org/wp-content/uploads/2021/03/subformats.png)