最近在学习破解linux密码,就用了John the Ripper 这个软件。我用自己的系统做实验,第一步:sudo ./unshadow /etc/passwd /etc/shadow>mypasswd;
第二步:./john mypasswd ;
但是提示:No password hashes loaded; 上百度问了下,还是不能解决我的情况,我猜想是不是 john 不支持 ubuntu10.04 的密文? 但是我又只有 ubuntu 系统 ,有谁用过 jhon 并且 成功破解了的,能把你们的密文传份给我吗? 我想看看密文到底是啥格式,到时候我直接把我需要破解的hash 加到那个密文 文件里就行了 。(安全起见:你们可以把你们的hash值换成别的。) 我把我的hash也贴出来,看这个密码破得了不。 05$Led8N1kvbWqyQ5DwJF7KTep/Qrf.csc4QMrVMg25V3aUk3RKejcba ------解决方案-------------------- http://www.openwall.com/john/doc/FAQ.shtml
上网那是官方FAQ 你的这个问题也做了详细的解答 自己看看
Q: Why doesn't John load my password file? It says "No password hashes loaded".
A: Your password file might be shadowed. You need to get both /etc/passwd and the shadow file (typically /etc/shadow), and combine them into one file for use with John. Please refer to EXAMPLES.
A: All of the password hashes found in the file (that are of the same type as the very first recognized hash in the file unless you're using the "--format=..." option) might be already cracked by previous invocations of John.
A: With PWDUMP-format files, John focuses on LM rather than NTLM hashes by default, and it might not load any hashes at all if there are no LM hashes to crack. To have JtR Pro or a build of JtR with the jumbo patch focus on NTLM hashes instead, you need to pass the "--format=nt" option.
A: The file you're trying to run John on might in fact not be a password file at all.
A: Your command line syntax might be wrong, resulting in John trying to load a wrong file.
A: Your password file format or hash type(s) might not be supported by John, or at least by the version and build of John that you're using. If you're positive that this is the case, you may want to check the contributed resources list on John the Ripper homepage for a suitable patch and, if unsuccessful with that, post a note to the mailing list (see CONTACT) including a sample password file line that John does not load (please make sure that the password is already changed by the time you post).