Crack SSH Private Key Passwords with John the Ripper [Tutorial]

Поділитися
Вставка
  • Опубліковано 18 лис 2024

КОМЕНТАРІ • 218

  • @greenleafcompanies1461
    @greenleafcompanies1461 4 роки тому +57

    I kindly request team null byte to make a series for beginners (basics) that would be awesome for us thx.

    • @juliandaddy3218
      @juliandaddy3218 4 роки тому

      He already did

    • @Zeath22
      @Zeath22 4 роки тому +1

      @@juliandaddy3218 can you link it ?

    • @anchorheavenonearth
      @anchorheavenonearth 4 роки тому

      shop.null-byte.com/sales/the-2020-premium-ethical-hacking-certification-bundle-2?.com&

    • @camille8712
      @camille8712 4 роки тому +5

      Sorry bro but learning how to hack has no defacto path way ... Just pick up skill after skill

    • @outlaw8379
      @outlaw8379 4 роки тому +1

      For basics go over to hackersploit. For intermediate go to null byte.

  • @tounn8990
    @tounn8990 Рік тому +2

    Bro it's insane ur the only tutorial to mention the jumbo installation and for a student like me it's so helpful, keep it up !

  • @MrRobot222
    @MrRobot222 4 роки тому +18

    Is it just me or does this video repeat itself from 7:00 and again @ 9:00?? It's been a long night!

    • @nohjrd
      @nohjrd 4 роки тому +5

      Hahaha, yeah I was feeling like I was in a timewarp and wondering if anyone else noticed. I'm guessing there was 2 takes and they got accidentally attached together when it was edited.

    • @ajdunham1390
      @ajdunham1390 4 роки тому +1

      Clicked the 7:00 timestamp, let it run for about 30secs
      Clicked the 9:00 timestamp(expecting to watch the same 30secs again), literally picks up exactly where I left off
      I guess it's not just you...

    • @MrRobot222
      @MrRobot222 4 роки тому

      @@ajdunham1390 Not sure how accurate the timings I listed were. Having watched the same part twice I didn't want to watch it all again! :D

  • @jean-baptistelasselle4562
    @jean-baptistelasselle4562 4 роки тому +8

    the password you're talking about : it's actually the passphrase for your SSH key, isn't it ? Just checked, that's a yeah. So ok, this is about cracking the passphrase.

  • @xs732
    @xs732 4 роки тому +6

    I remember John the Ripper from the 90's. Didn't know still existed.

  • @nikhilkanade34
    @nikhilkanade34 4 роки тому +6

    His intro was short, and he blinks!!!!

  • @itsme7570
    @itsme7570 4 роки тому +4

    This guy is very talented, what happened to Kody? Did he needed to be reprogrammed to blink?

  • @Anipppp
    @Anipppp 4 роки тому +11

    i want back the guy back who blinks more than others

  • @stevennugraha12
    @stevennugraha12 Рік тому

    YOU SAVE MY LIFE!!! I ALREADY CONFUSED LIKE 2-3 HOUR AND FINALLY YOU COME UP, BIGTHANKS

    • @osama_ddemyati
      @osama_ddemyati Рік тому

      I wanted to ask, do you know why we should change the permission ?

  • @TalesGrimm
    @TalesGrimm 4 роки тому +6

    Very informative. I loved this, but I have a question.
    Are you really bruteforcing if you have a wordlist?

    • @cl60cruzer
      @cl60cruzer 4 роки тому +2

      A password attack is bruting whether its from a list or crunch piped into hashcat.

    • @tobiaspeter4linux
      @tobiaspeter4linux 4 роки тому +2

      a worldlist is a certain help for bruteforce attacks since it provides an ending list of "patterns" to go through. It always depends on your needs and targets whether you use such lists or own patterns.

    • @TalesGrimm
      @TalesGrimm 4 роки тому

      @@tobiaspeter4linux I see, thanks!

    • @Nadzinator
      @Nadzinator 2 роки тому

      A wordlist is a subset of all the possible passwords in a bruteforce attack. It's a mini-bruteforce attack.
      Fun fact: a bruteforce attack will always be successful--given enough time. Unfortunately, passwords over a certain length will take months, years, centuries, or more to guess. A wordlist is just a shortcut, that drastically redueces the time requirement by bruteforcing only the most probable passwords.

    • @frank6706
      @frank6706 Рік тому +1

      @@Nadzinator you should say that "enough time" for decent passwords means a veeeeery long time.

  • @GisselleGuzman-pk8ui
    @GisselleGuzman-pk8ui Рік тому +1

    This is cool. But how would I get the private key first from a system that is not mine to then crack with john the ripper? Pls help.

  • @user-vn7ce5ig1z
    @user-vn7ce5ig1z 4 роки тому +2

    I used John the Ripper just last week to crack the password on a ZIP file I made back in the 90's. When I saw the password I had used, I face-palmed hard because I completely forgot that it was a password I used a fair bit around that time so I didn't think to try it, but also because I never would have guessed that I used that password on for that file. 🤦 (I was surprised it worked on a spanned archive set.)

    • @trooperthatsall5250
      @trooperthatsall5250 4 роки тому +2

      lol, you be surprised how many times I've had to use this tool and others to crack passwords were someone has left the business and taken the password with them (deliberate and just plain forgotten). As long as I get clearance up the chain and exhausted all line of obtaining it - I get the "nod" and a sign off from security, I was once asked to give a demonstration by a manager who wanted to know the way to do it, a big fat no from me and his ass reported up to security. As its technically red team tactics (black hat). A good skill set to learn along with firmware password cracking (this was due to an engineer who put a password in that he did not tell anyone) ~Trooper

    • @josephgoebbels1605
      @josephgoebbels1605 4 роки тому

      @@trooperthatsall5250 Why not demonstrate it? People should use stronger passwords anyway

    • @trooperthatsall5250
      @trooperthatsall5250 4 роки тому

      @@josephgoebbels1605 not my job too and its considered in the enterprise enviroment as a no-no. As as mentioned it's a practice considered black hat/red team and the user really did not need to know, it should all come by security then IT. No password is really unbreakable, but its time - how much time do you really want to invest in, want to do it quicker then you use more resources. A very long complex password will take time to crack its exponential. Trooper

    • @trooperthatsall5250
      @trooperthatsall5250 4 роки тому

      @@devnull-dz3gj Mate I know - buts its the world we live in, if you left it to the users they would have no passwords or such a feeble one its guessed at. It's old hat to me, I really don't care if Joe from accounting is a moron as long as he follows what's been laid down. You know the type, the same people that drive and use a handset or drink and drive and its everyone else's fault. ~Trooper

    • @bmbiz
      @bmbiz 3 роки тому

      I get the non-sharing part. It's the ratting out part that perplexes me. Unless the dude was a sleaze who you knew was going to start plundering the company's assets. :P

  • @JB_inks
    @JB_inks 4 роки тому +5

    You don't download passwords to brute force. This is very confusing and incorrect terminology

  • @Annie-hw2wl
    @Annie-hw2wl 3 роки тому +1

    Question.. I got my wallet hacked .. someone said that they could get it back but I need to get a cracking log .. iDK what it is and if he can get to all my info if I do ??

  • @SlycooperQuinn
    @SlycooperQuinn 4 роки тому +1

    Hey when you run your ./john -- wordlist=darkweb2017-top10.txt etc... it gives you a syntax error showing. /john is not a directory.
    Yet you run LS to display the contexts of your current directory and then you change completely different directories but still had your John script run? How is that possible

    • @phil.pinsky
      @phil.pinsky 4 роки тому

      One was the source folder and the other was the binary folder

    • @joestewart6459
      @joestewart6459 4 роки тому +4

      So this really has to do with how UNIX filesystems, and UNIX path works.
      the ~ stands for the home directory
      the . character stands for the current path.
      So when he runs it the first time with the error, bash is complaining the application/script "john" doesn't exist in path "~/src/john/src/"
      That's a true, and valid error. After he navigates to the directory to "~/src/john/run/" then he can run the application, because the application john lives in that directory.
      Applications in UNIX environments can only be run from within the directory they live, or the full path to the application must be provided in order to execute them. There is only one exclusion to this statement.
      That exception is applications that live in directories defined in the linux $PATH variable can be executed anywhere on the filesystem. However, since "john" lives in ~/src/john/run/
      it can only be called from within that directory, or the full path to the application must be provided.

  • @rohithvishaal
    @rohithvishaal 4 роки тому +2

    When will Cody return

  • @kidinfinity50
    @kidinfinity50 5 місяців тому +1

    You may have to do ssh -oHostKeyAlgorithms=+ssh-rsa user@ip whatever your ip is

  • @muizztanda6171
    @muizztanda6171 2 роки тому

    How Can i decode the layer "raw" of ssh packet with python. I have the packet but i can't decode the message

  • @dundydunker
    @dundydunker 3 роки тому

    That's a dictionary attack not a brute force. Brute force is guessing literally every letter until the hash matches up. Dictionary is using a word list.

  • @Crypro_Wallet_Finder
    @Crypro_Wallet_Finder 4 дні тому

    Any thoughts on where Bitcoin is headed next?

  • @nD-ci7uw
    @nD-ci7uw 3 роки тому

    Can't reproduce "[SSH] cipher value of 6 is not supported! " when running john command

  • @cecilsans-souci6098
    @cecilsans-souci6098 Рік тому

    does this work on opening the user and pass of an hostname on its port 22 ssh

  • @drygordspellweaver8761
    @drygordspellweaver8761 3 роки тому

    Which keyboard do you use?

  • @danielcaballeroperez8668
    @danielcaballeroperez8668 4 роки тому +5

    Hey I like these kind of things but this chanel is too complicated for me to understand yet, could u recommend me another simpler chanel pls

  • @kalaipradeep2753
    @kalaipradeep2753 2 роки тому

    Using default input encoding: UTF-8
    Loaded 1 password hash (Raw-MD5 [MD5 256/256 AVX2 8x3])
    No password hashes left to crack (see FAQ)
    Error

  • @tobiaspeter4linux
    @tobiaspeter4linux 4 роки тому +5

    dude, you got great skills but please improve your didactic methods...

  • @SadaraxTutorials
    @SadaraxTutorials 3 роки тому

    Hey can someone just explain why we make the authorized keys file? And how it's utilised?

  • @fredianriko5648
    @fredianriko5648 4 роки тому

    so I see that you are using Ubuntu as a host and also ubuntu for the target on a virtual machine, is it possible to do the same if I try this with both OS on a virtual machine?

    • @christiaansteenkamp5617
      @christiaansteenkamp5617 4 роки тому

      It depends on how your networking is setup and what VM you are using. It is pretty do-able in some thing like GNS3 you can create a entire network with different OS and devices you just need to get the images for the switches and routers. The OS images are easy to get straight out of GNS3 (ua-cam.com/video/Ibe3hgP8gCA/v-deo.html) This example is for Windows setup. you actually skip alot of these steps if you use linux.

  • @devrajchhikara741
    @devrajchhikara741 4 роки тому +1

    does tp link tl wn722n supports monitor mode and packet injections

    • @craigjackson6450
      @craigjackson6450 4 роки тому

      only if it is v1 because v1 has the chipset which supports those functions
      v2 and v3 of this adapter use a different chipset which support neither support monitor mode nor packet injection

  • @aasportsonline
    @aasportsonline 3 роки тому

    wget for the wordlist doesn't work?

  • @ThanyaCurvin
    @ThanyaCurvin 2 місяці тому

    Thank you so much for this amazing video! Could you help me with something unrelated: I have a SafePal wallet with USDT, and I have the seed phrase. (behave today finger ski upon boy assault summer exhaust beauty stereo over). How should I go about transferring them to Binance?

  • @bit4ka625
    @bit4ka625 2 роки тому

    4:48 "No module named SimplerHTTPServer" what i can do to fix it?

  • @niking6861
    @niking6861 4 роки тому

    Can i put Tp-link TL-WN722N version3.0 in monitor mode?

  • @tubeDude48
    @tubeDude48 4 роки тому +4

    Went to fast, and *STILL* playing that dying *CRAPPY* *MUSIC!!!*

    • @NullByteWHT
      @NullByteWHT  4 роки тому +1

      You realize Lynyrd Skynyrd would sue us right?

  • @DuBxd
    @DuBxd 4 роки тому +1

    We need Kody back

  • @menive4456
    @menive4456 4 роки тому

    Can i use hashcat?

  • @idhantsood1105
    @idhantsood1105 4 роки тому

    Is there a way to install kali, root or parrot in windows and then add things like metasploit in them?

    • @jaybofa617
      @jaybofa617 4 роки тому

      There are subdirectories you can install for Kali on a Windows machine. I haven’t tried it but you can try the good old apt install for metasploit

    • @tzniceguy
      @tzniceguy 4 роки тому

      I recommend to use Virtual Machine like Vmware and Virtualbox , you can check swahilielites for tutorial

    • @idhantsood1105
      @idhantsood1105 4 роки тому

      Thanks For the Answers!

  • @TestAccount23027
    @TestAccount23027 4 роки тому

    What is ssh

  • @team-icy-9511
    @team-icy-9511 2 роки тому

    Could you help me crack a file?

  • @codygaudet8071
    @codygaudet8071 3 роки тому +1

    From @8:40 to @9:00 you're doing things with no explanation. Speeding through things makes it seem like you're hiding something.

    • @lemonbirdo1353
      @lemonbirdo1353 3 роки тому

      It looks like a bit of an editing "mistake". After he does that little sped up segment, he cuts to a re-do of his explanation on how to crack the hash.

  • @henryben978
    @henryben978 2 роки тому

    I wanted to ask you for help for something please?

  • @nocodenoblunder6672
    @nocodenoblunder6672 3 роки тому

    Cant crack my passphrase if there is none.

  • @cosmicrider5898
    @cosmicrider5898 4 роки тому +2

    Great now we need 2fa for ssh

    • @estudiordl
      @estudiordl 4 роки тому

      Thinking the same, recently saw:
      ua-cam.com/video/krRskVc3s4c/v-deo.html

  • @haha-ul3mt
    @haha-ul3mt 4 роки тому

    what if it is a strong password ,it wont work right?

    • @estudiordl
      @estudiordl 4 роки тому

      I suppose, this is a brute force approach so it all came down to the password strength vs computer power... 🤔

    • @christiaansteenkamp5617
      @christiaansteenkamp5617 4 роки тому

      It checks against a list of "most likely used" passwords so if you are bilingual set passwords up in a different language to English.

  • @zerotwo532
    @zerotwo532 4 роки тому +6

    WHAT!!!! HE BLINK NOOO U ARE NOT A HACKER

  • @poorneshadhithya
    @poorneshadhithya 4 роки тому +1

    Please hire a better editor, and where is kody?

  • @vergverilvehrigl
    @vergverilvehrigl 3 роки тому

    yo, is this a virus cuz im tryna get back my old roblox acc 😐

    • @aether0625
      @aether0625 3 роки тому

      wtf why are you watching a ssh cracking video to get your old roblox account back, just email them

    • @vergverilvehrigl
      @vergverilvehrigl 3 роки тому

      @@aether0625 bruh i lost my account for over 3 years, you wouldve think ive emailed them like over 100 times.. yes i emailed them dumbass, but i did get it back so.

  • @melokuhlegqoli9952
    @melokuhlegqoli9952 3 роки тому

    Where's the guy who doesn't blink

  • @eseseis7251
    @eseseis7251 4 роки тому +4

    OMG , where is the injection bla bla? you did nothing new, you didnt even knew .ssh folder existed before this vid.
    and ppl liking the vid have no idea what they just watched.

  • @chandraprakashpandian
    @chandraprakashpandian 4 роки тому +1

    Guys my wifi adapter supports monitor mode and packet injection after setting it in monitor mode airodump-ng doesn't work, it doesn't capture any wifi networks in my area and the channel number above BSSID changes from 1 to 14 and nothing happens, kindly help me 🙏🙏🙏🙏🙏🙏🙏

    • @tobiaspeter4linux
      @tobiaspeter4linux 4 роки тому

      how did you make sure it's in monitor mode? Maybe there are simply no other networks?

  • @illest-trading
    @illest-trading 4 роки тому +2

    I need some help with trying to hack something and I can’t find anything on it

  • @TheRealZamFit
    @TheRealZamFit 4 роки тому +1

    Nick. Love the haircut.

  • @JulioRasner
    @JulioRasner Місяць тому

    Thanks for the analysis! 🔍 I wanted to ask something unrelated: 🤔 I have a set of words 🤷‍♂️. (behave today finger ski upon boy assault summer exhaust beauty stereo over). Not sure how to use them, would appreciate help. 🙏

  • @videotime8169
    @videotime8169 4 роки тому

    Where is kody ????????

  • @DavidMills1222
    @DavidMills1222 4 роки тому +1

    Please take a typing course. and this video doesn't help at all.

  • @abdulfarhan4775
    @abdulfarhan4775 3 роки тому

    I want to know password of this account

  • @mayhem1994
    @mayhem1994 2 роки тому

    all i want to do is mount my key files to another machine

  • @anolchakraborty
    @anolchakraborty 4 роки тому

    If you neither used nmap not ddos against null byte's ip then you are not a true student of null byte🙃

  • @abdulrahmanfaisal288
    @abdulrahmanfaisal288 4 роки тому

    If you can find the password in the post so you will waste your time on notiing

  • @Hateler1
    @Hateler1 4 роки тому

    Hi bro can u teach us how to hack a laptop or a mobile which connected to a wifi ?

  • @weirdworld9743
    @weirdworld9743 4 роки тому

    Can you crack the router login page?? Plz tell how

    • @tobiaspeter4linux
      @tobiaspeter4linux 4 роки тому

      real ICT professionals are creative and think over the regular horizon to find out alone. :-)

    • @tobiaspeter4linux
      @tobiaspeter4linux 4 роки тому

      @c ball this was now some sort of badass reply ;-)

  • @imuser007
    @imuser007 4 роки тому +3

    Wow this guy is amazing he have an talent like an kody ❤

  • @lloydsato9484
    @lloydsato9484 4 роки тому

    bring back the other guy

  • @brettking8663
    @brettking8663 3 роки тому

    Bro not everyone is in college and on Adderall. Slow down

  • @Star-eb5zg
    @Star-eb5zg 3 роки тому +1

    I'm not going to sugarcoat this... You breeze over important steps of the tutorial which even intermediate hackers who use ssh regularly may still need more clarity on. You are constantly go off topic and type commands that the viewers can't keep up with into your command line without explaining what you are doing. There was clearly barely any effort put into editing this video and the guy talking hasn't got great communicative skills andmis mumbling half the time.

  • @joraj9312
    @joraj9312 4 роки тому +1

    8:56 minecraft.

  • @tvchannel3712
    @tvchannel3712 4 роки тому

    Search identy from Android phone no

  • @nichijoufan
    @nichijoufan 4 роки тому +3

    *BEEP*
    Firewall only allows certain ips to use port 22 (ssh protocol), easy fix

  • @zerosploit
    @zerosploit 4 роки тому +2

    Learned alot nick thank you

  • @katsu471
    @katsu471 4 роки тому

    Who can crack private key!

  • @chanchalbehanbhaikaiseho6934
    @chanchalbehanbhaikaiseho6934 3 роки тому

    Noo

  • @userou-ig1ze
    @userou-ig1ze 4 роки тому

    meh... should be titled how to use a python script to get authorized keys to john compatible format. Basically, this video script should be equivalent to the git readme of ssh2john. Otherwise well done!

  • @fasii2.0
    @fasii2.0 4 роки тому

    Sir please make a video on face book haking just one video

  • @sagarparki3437
    @sagarparki3437 Рік тому

    why did you skip the main part? disgusting?

  • @xristoss.2037
    @xristoss.2037 4 роки тому

    Oh shit here we go again

  • @sepehrghasemy1267
    @sepehrghasemy1267 3 роки тому

    he blinks . yay

  • @Rahul-nw6dn
    @Rahul-nw6dn 4 роки тому

    where the fuck is no blink guy

    • @NullByteWHT
      @NullByteWHT  4 роки тому

      woah

    • @Rahul-nw6dn
      @Rahul-nw6dn 4 роки тому

      @@NullByteWHT I am sorry it was my cousin who wrote that he just wants to get me into trouble Sorry OMG

  • @rudolfhrastovic4460
    @rudolfhrastovic4460 3 роки тому

    this was hard to follow

  • @rashmikamandanna3227
    @rashmikamandanna3227 3 роки тому

    ok

  • @myfaveyoutube
    @myfaveyoutube 3 роки тому

    this is basics

  • @jerofin5123
    @jerofin5123 3 роки тому

    Fake

  • @huzaifansari2814
    @huzaifansari2814 3 роки тому

    Hakka

  • @huzaifansari2814
    @huzaifansari2814 3 роки тому

    Lalla

  • @berni9977
    @berni9977 2 роки тому

    What about the zips ?????

  • @kaizenzehava9296
    @kaizenzehava9296 3 роки тому

    I'll use this soon! Thanks ✨

  • @huzaifansari2814
    @huzaifansari2814 3 роки тому

    Lakao

  • @huzaifansari2814
    @huzaifansari2814 3 роки тому

    Haha

  • @sdafasfF
    @sdafasfF 4 роки тому

    This might be a little too much to ask for but the original null brute guy can you please give me a quick shoutout in your next video I wanna be a big UA-cam like you one day

  • @monkeybizx1sloan902
    @monkeybizx1sloan902 4 роки тому

    𝐈 𝐰𝗼𝐮𝐥𝐝𝐧' 𝐡𝐚𝐯𝐞 𝐭𝐡𝐞 𝐬𝐥𝐢𝐠𝐡𝐭𝐞𝐬𝐭 𝐜𝐥𝐮𝐞 𝐰𝐡𝐞𝐫𝐞 𝐭𝗼 𝐛𝐞𝐠𝐢𝐧!

  • @huzaifansari2814
    @huzaifansari2814 3 роки тому

    Najaj

  • @huzaifansari2814
    @huzaifansari2814 3 роки тому

    Sysu

  • @huzaifansari2814
    @huzaifansari2814 3 роки тому

    Kakao

  • @elisha5007
    @elisha5007 4 роки тому +3

    Awesome ! 👩‍💻

  • @raihanadiarba
    @raihanadiarba 4 роки тому

    please make a video with Indonesian translation

  • @huzaifansari2814
    @huzaifansari2814 3 роки тому

    Kajs

  • @huzaifansari2814
    @huzaifansari2814 3 роки тому

    Jajaj

  • @huzaifansari2814
    @huzaifansari2814 3 роки тому

    Hajak

  • @huzaifansari2814
    @huzaifansari2814 3 роки тому

    JaiaiB

  • @pepemunic3661
    @pepemunic3661 4 роки тому

    6:08 so u go tu ucla?

  • @huzaifansari2814
    @huzaifansari2814 3 роки тому

    Lalao