Password Hacking in Kali Linux

Поділитися
Вставка
  • Опубліковано 21 лис 2024

КОМЕНТАРІ • 525

  • @Synclon
    @Synclon Рік тому +573

    UA-cam Please Don't Take this Video Down is for Educational Purposes Only 🙏

  • @justchecking12
    @justchecking12 Рік тому +18

    Pretty straightforward pretty simple way of presentation and you literally smash the youtubers who are trying to showcase their pretty secret ways of password cracking in 2 minutes not telling all the details and crucial structure of how it works.

  • @norfin8503
    @norfin8503 Рік тому +7

    This man really hit the ground running and hasn't stopped yet. He gives us more understanding of him without interviews and negative antics he just shows us who he is through the Recovery. True living legend. We salute to team usespy online. The execution, creativity, and goodness that came from it were inspiring on a number of levels. Cheers Alex & looking forward to seeing what you do next!

    • @Biyodmr
      @Biyodmr 8 місяців тому

      bana yardımcı olabilir misiniz hack ile ilgileniyorsanız

  • @saurabhrathour8032
    @saurabhrathour8032 3 місяці тому

    Hey ppl, I'm a retired computer/IT person, Yet I still find *Adrian hacks online on the WEB* so informative and straight forward. Thanks for your advise and helping the people...........Great work and love watching.

  • @adyp487
    @adyp487 Рік тому +31

    Why is this so ridiculously helpful?!
    PS: thanks John! Awesome work as always! 💜

  • @siddhantr1451
    @siddhantr1451 11 місяців тому +2

    He and David Bombal both have very good knowledge and understanding

  • @davejackson1281
    @davejackson1281 8 місяців тому

    This should be required viewing in school. My wifi has been acting up but my service provider says its nearly impossible to hack my modem/wifi. Now I see how easy it is and I can take steps to mitigate my exposure. The days of assuming that only a trained professional can be a danger to privacy are over.

  • @HiiHii-qo5ez
    @HiiHii-qo5ez 3 місяці тому

    The way you approached this project added so much to it. It’s great to see how your unique perspective contributed to the outcome. The role you play on your job *Adrian hacks online on the WEB* is crucial. I really appreciate the constructive feedback you give to me regularly

  • @misholapatrick1925
    @misholapatrick1925 Рік тому

    The efficiency of this *Top phase Resolution* is next level. To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work Mike !!!

  • @SumanRoy.official
    @SumanRoy.official Рік тому +68

    What John did not show you the most realistic way of Password cracking, Hashcat is really powerful but if you run short on wordlist you will never be able to crack it.😂
    So to mitigate this situation where you can implement "rules" for hashcat which can modify the password candidate and try to check for different variations of the same password, that way your cracking probability increases significantly.

    • @HitemAriania
      @HitemAriania Рік тому +7

      Indeed, do you have some good rule recommendations? Also, Hashcat is not only CPU based, you can select your GPU for even greater success (WSL is great for nvidia cards as an example)

    • @icebice
      @icebice Рік тому

      @@HitemAriania OneRuleToRuleThemAll is good afaik

    • @vaykhaVaykha
      @vaykhaVaykha Рік тому +1

      Hey. Can u help me with something.?

    • @shelbyRogers-zn9rm
      @shelbyRogers-zn9rm Рік тому +1

      Whitehackerone is the best

    • @anupkarki8237
      @anupkarki8237 Рік тому +1

      Have you been succesful using that?

  • @paulhimle
    @paulhimle Рік тому +3

    Nice to be known as a “good friend”. One ‘Like’ coming up! 😊

  • @erichillel6284
    @erichillel6284 4 місяці тому

    This is awesome, very interesting and good job !!! As per my understanding, not matter which type of attack we will use, we will obviously always have to provide a Wordlist. So, this is the real challenge. For example, the number of non-duplicated combination of words with length=10 is 94^10 =621,491,424,183,448,320,000. What about the others lengths and what about the emojis... Looks like an impossible mission. And I even didn't mention the fact that every such run make take days, weeks,...

  • @carparkingemir5741
    @carparkingemir5741 Рік тому +4

    This man really hit the ground running and hasn't stopped yet. He gives us more understanding of him without interviews and negative antics he just shows us who he is through the Recovery. True living legend. We salute to usespy online. The execution, creativity, and goodness that came from it were inspiring on a number of levels. Cheers Alex & looking forward to seeing what you do next!

  • @TAHAEDİTSYT333
    @TAHAEDİTSYT333 Рік тому +6

    Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contemplating on where do I start, what am I going to focus my studies on and how difficult will it be for me with no IT background? However, watching this video have answered to all the questions. Thanks for taking your time to put this together for people like me *usespy online.*

    • @Biyodmr
      @Biyodmr 8 місяців тому

      kanka bana bi konuda yardımcı olur musun eğer hack ile ilgileniyorsan

    • @TAHAEDİTSYT333
      @TAHAEDİTSYT333 8 місяців тому

      Yorumu ben atmadım ki kendi kendine otomatik atıyor herhalde telefonuma virüs girmiş

  • @TagsYoureIt
    @TagsYoureIt Рік тому +9

    Every time I watch these episodes about passwords, I am terrified I'll see mine up there

    • @skreamzu
      @skreamzu Рік тому +1

      thats why you should use a password manager with "randomly" generated passwords!

    • @danielorji1829
      @danielorji1829 15 днів тому

      🤣🤣🤣

  • @theWSt
    @theWSt Рік тому +1

    Great video, thx a lot! My days as an amateur hacker are over for a long time, but I'm surprised that John the Ripper is still actively maintained.

  • @TheLakeJake3
    @TheLakeJake3 Рік тому +11

    Would be careful self hosting pass bolt and making it available on the internet. Also with running in the cloud unless you know what you’re doing. Best to host on your lan, but only reachable via VPN to home network. Hope someone who needs to read this does

  • @feliciaware7609
    @feliciaware7609 Рік тому +1

    As a Retired combat Marine I want to tell you that as what you are doing is just as important as any warrior on the battlefield. You are waging warfare against cheater on the digital battlefield. You are defending and protecting the most vulnerable of our society against these predators and cheaters. Keep up the good work Team *Topphase Resolution* ..

  • @jbit590
    @jbit590 Рік тому +34

    Thank you John for another amazing video, An understandable educational experience that doesn't make you want to take a nap lol very awesome 👏

  • @luciferofazaroth
    @luciferofazaroth Рік тому +3

    Love hashcat use it every week I crack anywhere from 300-600 passwords a week using a GPU which I would recommend. I have used my laptops CPU to crack smaller passwords on the fly but takes quite a lot longer.

  • @nazmiyeendes4560
    @nazmiyeendes4560 Рік тому +2

    The efficiency of this *usespy online is next level.* To juggle walk throughs of various angles on the topic delivered to-camera, differnet content per topic from various folks underneath the umbrella of the track list of the larger big band concert itself is engaging and refined. To make a dense taccess like this so digestible is really something. Awesome work Mike !!!

  • @gopalrajkumar7323
    @gopalrajkumar7323 11 місяців тому

    john your speech is well paced and your diction is excellent. Easy to understand for a fella like me. I appreciate it as do many without doubt. But can you slow down a fraction?

  • @medelpasand
    @medelpasand Рік тому +2

    high quality content that matches your personal energy...... great work John . keep it going

  • @mehmet_428
    @mehmet_428 Рік тому

    This is the most comprehensive, understandable, well-presented historical spy site overview I have heard from any online agency. I have subscribed to and shared your channel with friends around the world. Whoever created usespy online that particular spy site deserves the highest of journalistic accolades. Bravo!

  • @juliusrowe9374
    @juliusrowe9374 Рік тому +3

    John, super dope tutorial! Please do more of these.

  • @pedallknife
    @pedallknife Рік тому +2

    Keeping me motivated John, Can't wait to meet you one day!

  • @BM.Molin_2.0
    @BM.Molin_2.0 Рік тому

    0:32 this video has been very helpful 1:30 ❤❤❤❤❤❤

  • @TheQuest07
    @TheQuest07 Рік тому +1

    Kickstarter - Online Cyber Security School.
    Great video John!

  • @GooopGoooop
    @GooopGoooop Рік тому +6

    Hey John! In the first example, you showed us how attempting a password manually 3 times boots us out. How did hydra circumvent that security feature?

    • @Tomasu321
      @Tomasu321 Рік тому +1

      You have 3 attempts before the server closes the connection, but you can just connect again. So hydra either opens a new connection for each attempt or every other attempt.
      However it's very noisy and your ip is most likely going to get banned pretty fast if used. Using Fail2Ban for example.

  • @beratcakr9020
    @beratcakr9020 Рік тому

    The quality of your spy job is so incredibly high. If you don't have team usespy online behind you, then you are clearly a multi talented individual. The way the access is structured are perfect, the visuals are stunning, the narration is engaging, and of course, the project is itself intriguing. You are a professional !!

  • @FordCyber
    @FordCyber Рік тому

    Nice shot!! let's learn with John Hammond!!

  • @therealblastpop4540
    @therealblastpop4540 Рік тому +2

    Interesting video. I'm really cueious how people use the mask attack.

  • @An.Individual
    @An.Individual Рік тому +2

    4:19 definitely some naughty words in that password list 🙂

  • @Marc.Google
    @Marc.Google Рік тому +4

    Love your energy and positivity John!

  • @karstenachiriachu4840
    @karstenachiriachu4840 Рік тому +3

    Great job man. Really do appreciate, learned a lot

    • @henrykandakai6955
      @henrykandakai6955 Рік тому

      You need help *GREATSMARTTECH*

    • @henrykandakai6955
      @henrykandakai6955 Рік тому

      GreatSmartTech is strongly recommended for problems and solutions for social media accounts…✅🇺🇸

  • @rudigerheissich9800
    @rudigerheissich9800 Рік тому +13

    How could it be that in the 1st attempt, when John typed in the password by himself, he was locked out after three attempts, but when he used the dictionary, he could try as often as he wants?

    • @wrdsalad
      @wrdsalad Рік тому

      He wasn't locked out, his session was terminated. He just needs to reestablish a new session and try again. He reached the "MaxAuthTries" or half of it, rather. Run the command "man 5 sshd_config" to find out more about "MaxAuthTries"

    • @ignovia2122
      @ignovia2122 Рік тому

      This isn't something I've looked into at all, but what makes sense in my head is that it could be something like this: Imagine that his 3 attempts to log in are like putting a key in a lock and trying to turn it. Perhaps the lock is set up to automatically kick you out when it detects three consecutive failed turns. What I'm thinking is that maybe hydra and other brute forcers/crackers are able to compare the "keys" to the "lock" without actually turning them, therefore seeing what would work and what wouldn't work without actually having to "turn the key," thus never triggering a reaction.

    • @mckenziepepper7942
      @mckenziepepper7942 Рік тому +7

      Hydra starts another connection for every attempt.

    • @rudigerheissich9800
      @rudigerheissich9800 Рік тому +1

      @@mckenziepepper7942 ty :)

    • @shelbyRogers-zn9rm
      @shelbyRogers-zn9rm Рік тому

      Whitehackerone is the best

  • @purpleman173
    @purpleman173 Рік тому +1

    Awesome educational/informational video John, thank you 🙏

  • @nikhil2465
    @nikhil2465 Рік тому +4

    everything was easy to understand but how we are going to get ip address w/o permission

  • @dennislindstrom8155
    @dennislindstrom8155 Рік тому +1

    love those kind of videos. learn alot from you

  • @compilererror
    @compilererror Рік тому

    I love this channel. Thanks for putting in the time and effort!

  • @Vilematrix
    @Vilematrix Рік тому +1

    hashes are just static numbers for plain asni chars. thats why salts come into place and re- hashing. most likely done with open source local cpu powerd crypto libs.

  • @phillydee3592
    @phillydee3592 Рік тому

    Very nice demonstration 👌🏼👌🏼

  • @LemonZ-Original
    @LemonZ-Original Рік тому +6

    It would be great if you could create/partner with a service that offers red team based exercises and labs that allow all levels of expertise to benefit and learn from. Something I would definitely pay for.

    • @HeimRocker
      @HeimRocker Рік тому

      What about TryHackMe or HackTheBox ?

    • @lfcbpro
      @lfcbpro Рік тому

      TryHackMe has red team exercises, a lot is membership content, but there are free labs too.

    • @mayavik1034
      @mayavik1034 Рік тому +1

      John Strand's Cyber Range

  •  Рік тому +2

    Thank you for this content

  • @LeMel257
    @LeMel257 Рік тому

    Duuuuuuuude!!!! The Hacker Caracters in the Passbolt!!!! hahaha Love it!

  • @sharulalom7541
    @sharulalom7541 3 місяці тому

    Y’all should stop calling everything “the bare minimum” when it’s literally not. Respect is the bare minimum, actually going out of your way to comfort and have an open ear for someone isn’t. Doing something like this is truly very nice and a great thing of him to do. I hope shit gets better for you and I salute *Adrian hacks online on the WEB* for being mature when it’s needed!

  • @gerardmatija1677
    @gerardmatija1677 Рік тому

    noo paolo cannone , ti seguivo da quando hai fatto il video di gara con gli inoob

  • @Crisco4393
    @Crisco4393 Рік тому

    You are Outstanding John H.🎉❤😊

  • @satishtiwary
    @satishtiwary 9 місяців тому

    hydra is more easy
    you can use medusa or
    you can use ncrack

  • @juiceboxjones3446
    @juiceboxjones3446 Рік тому

    Passphrases are the way to go

  • @germcauliffe7
    @germcauliffe7 Рік тому

    Another Great Video John. Fantastic Content!!!!

  • @quenchikennedy4568
    @quenchikennedy4568 Рік тому

    Sir thank you for such a great information.
    We appreciate your hard work

  • @zaubermaus8190
    @zaubermaus8190 Рік тому +1

    i really hope the world will deprecate the use of traditional password systems soon, because its *so* annoying to deal with and most of the time it creates more problems than it solves. its a hassle for any user and a goldmine for any hacker.

  • @GabrielJasonWhitemumba
    @GabrielJasonWhitemumba Рік тому

    Love learning hacking

  • @nobody124...
    @nobody124... 8 місяців тому

    I am interested in ethical hacking and cybersecurity can you provide some roadmap and most of the course which is available online are outdated. give some suggestion from where to start

  • @MailonOfficial
    @MailonOfficial 9 місяців тому

    Very helpful video not to use it against someone but for our own knowledge and have an idea how things work!

    • @nicholasbloom1
      @nicholasbloom1 9 місяців тому

      but does it help getting into an old gmail cuz i need help with that

  • @emongtindero
    @emongtindero Рік тому

    Thank you John, really informative

  • @lfcbpro
    @lfcbpro Рік тому +1

    Is there a way to determine password 'rules'?
    So for example, it might say you have to use a number, character, capital letter etc?
    Thereby, you would know that passwords like 'adminadmin' are not worth trying, because they would not be allowed under the rules.
    Also, how does something like Hydra get around a time-out, where you can't try over and over, because it will either lock you out completely, or after say 5 attempts you have to wait 5 mins for next attempt to be allowed?

  • @kaas12
    @kaas12 Рік тому

    John, could you make a video about Genesis market that has recently been shut down? I’m wondering what they were selling there as they said it wasn’t just credentials but also browser addons which facilitated identity theft and account hijacking.

  • @charangmaharaj
    @charangmaharaj Рік тому +2

    When I executed hydra I am unable to get any valid password ..message is 0 valid password

  • @OviOvi-y6d
    @OviOvi-y6d Рік тому +1

    Vrry good well done 😝

    • @OviOvi-y6d
      @OviOvi-y6d Рік тому

      I will start using passbolt thanx

  • @jubaaissaoui5496
    @jubaaissaoui5496 Рік тому

    Evidently, IP addresses continue to hold a considerable level of importance

  • @brainkato
    @brainkato Рік тому

    Hello I love this very much but i would like to get Kali Linux
    How do I learn the Kali Linux commands Thanks for teaching us but reply me

  • @KLove89
    @KLove89 8 місяців тому +1

    Seth Rogan has a hacker brother

  • @hirukosato7629
    @hirukosato7629 Рік тому +2

    how did u get the ubuntu and windows side by side please teach us

    • @subarunatsuki1902
      @subarunatsuki1902 Рік тому

      That's what I am wondering about right now. Did you found the solution?

  • @gstar2568
    @gstar2568 3 місяці тому

    Everyone should have a dedicated person like you *Adrian hacks online on the WEB* . People dream of hiring such a talented expert like you. Keep up the hard work.

  • @MAHESHKUMAR-zi3rj
    @MAHESHKUMAR-zi3rj Рік тому

    THANKS SIR FOR BEST VIDEO CONTINUE YOUR SERVICE

  • @hkhackeroriginal
    @hkhackeroriginal Рік тому +1

    Hats off to you.....

  • @5DimesPlayer
    @5DimesPlayer Рік тому +1

    With Hydra, wouldn't you want to use something to mask your IP address? A firewall would detect all those password guesses, right? I'm asking as a noob.

    • @IMBlakeley
      @IMBlakeley Рік тому

      fail2ban will block pretty quick.

  • @hamedranaee5641
    @hamedranaee5641 Рік тому

    Johny Johny you are awesome🤩

  • @ISMA20003
    @ISMA20003 7 місяців тому

    Hi, thanks for this tutorial, one question why just create one user name and stop?

  • @micro-helper
    @micro-helper Рік тому +2

    Love from Pakistan 🇵🇰

  • @abcpsc
    @abcpsc Рік тому +6

    So why SSH didn't lock the account / give you some cool down time before retry? Seem like in the brute force attack Kali just guess without being stop in any way

  • @currupt_cryptids8534
    @currupt_cryptids8534 5 місяців тому +1

    ok but here is the thing, how am I supposed to find out the targets ip if I dont have access to the device

  • @mandybrent4456
    @mandybrent4456 Рік тому +3

    I'm just here to say thank you to *Eagle Spy Recovery Page* the generosity he has shown will forever be in my heart. Thanks for the perfect job..

  • @gamingtishan171
    @gamingtishan171 Рік тому +1

    Sir give a video on set

  • @cybersectom
    @cybersectom Рік тому

    Another great video!

  • @AndreeaCe
    @AndreeaCe 4 місяці тому

    So why do you set up virtual machines instead of partitioning drivers, doesn't that overloads your PC?
    What's your main OS?
    Might be better to use a container than a VM. I'd invest in some good external hard drivers to set up different OS and the used for such practices. Nowadays aren't that expensive, but in case that cannot be done, guess what is your doing it's sort of all right. In the end it will affect your hardware, so you'll have to do some repairs. I also presume when used malware attacks against eachother, once connected to the internet, it will find a way to leave the VM...

  • @chaplinburp1731
    @chaplinburp1731 Рік тому

    Hello John Hammond, How do you make a Wordlist with Crunch tools?

  • @echoawoo7195
    @echoawoo7195 Рік тому +3

    A hash is NOT an encryption.

    • @penggrin
      @penggrin Рік тому

      cool

    • @echoawoo7195
      @echoawoo7195 Рік тому +2

      @@penggrin Not cool, important.

    • @InZaNiOnGaMiNg
      @InZaNiOnGaMiNg Рік тому

      @@echoawoo7195i think its really cool and important. It can be both

  • @ChrisspinBrakmah
    @ChrisspinBrakmah Рік тому

    I love the video, big up

  • @tkirishima
    @tkirishima Рік тому

    For ssh, it's just better to use a ssh key

  • @diamond5003
    @diamond5003 9 місяців тому

    This was freaking helpful

  • @bradfoster4198
    @bradfoster4198 Рік тому +9

    Couple Questions :
    Does SMB really spam out your NTLM hash to anyone who asks like that? That's kind of terrifying.
    Also, when using the dictionary attack against SSH in that way, isn't there rate limiting to prevent it from trying hundreds of passwords?

  • @YusufKaratas-kn8wr
    @YusufKaratas-kn8wr Рік тому +3

    You consistently bring your all and I truly appreciate that usespy online . Thank you for making the corporate life so smooth. Proud to have you work for me. Great work as always.This is the beginning of many more good things to come. May you get everything, that you could demand. Best wishes in all you do and congrat to me as well, job well done!

  • @izakk91
    @izakk91 Рік тому

    Thanks for the information

  • @unsuccessyoutuber1
    @unsuccessyoutuber1 Рік тому

    Nice hear

  • @jamesjones6445
    @jamesjones6445 9 місяців тому

    Are you using VMware or. What are u using to use kali and ubantu the environment

  • @fixer1140
    @fixer1140 Рік тому +1

    "You should not be using english words in your password"
    Me creating passwords in portuguese kkkkkkkkkkk

  • @jacobfinder7476
    @jacobfinder7476 Рік тому

    John is great!!

  • @calvinharrykojoworlanyomis8208

    you're good mate !!!

  • @droidy347
    @droidy347 Рік тому +2

    Bing AI tried reporting me as a “cyber criminal” because I asked it how to crack a hash using hashcat but then I said “I’m just a computer forensics student it’s for a class project” and it calmed down

  • @AbuduadjallaOuro-rg8ks
    @AbuduadjallaOuro-rg8ks Рік тому

    now i got it all. It has been a longtime I try to understand how this works.

  • @laith4291
    @laith4291 Рік тому +1

    I have a question
    What if the password bolt or whatever its name get hacked
    Does that mean every single password gonna leaks out or what

  • @kevinwong_2016
    @kevinwong_2016 Рік тому +1

    Do some mobile malware analysis

    • @_JohnHammond
      @_JohnHammond  Рік тому

      Do you have any mobile samples to share?

  • @Networkguy-800
    @Networkguy-800 5 місяців тому

    Question, Does one have to be on the network to be able to do that . How could you do it remotely?

  • @JayeshRaj-v1r
    @JayeshRaj-v1r Рік тому

    nice video . If password is not found in both this file fasttrack and rockyou then how to find password of machine

  • @MikePenu-gt1wz
    @MikePenu-gt1wz 7 місяців тому

    Thank you

  • @ddineshthapa9489
    @ddineshthapa9489 Рік тому

    I have been trying this pole

  • @taiquangong9912
    @taiquangong9912 8 місяців тому

    With Responder, you have to be on the network to pull those hashes?