Wilmer AlmazanProdevnetjourney.com·4 hours agoGenerating a Custom Wordlist Using John the RipperOverview John the Ripper (often abbreviated as "John" or "JtR") is a widely used password-cracking tool that includes powerful wordlist generation capabilities. While John is primarily known for its password-cracking functions, it also provides utili...DiscussPentestingwordlist
Parthparthh.hashnode.dev·Jul 22, 2024ParrotCTF Backdrop: Detailed WalkthroughThis room focuses on leveraging several misconfigurations and gaining initial access using the CMS dashboard. While it requires some research, it is a relatively straightforward machine.Access the machine here Let's dive in! Enumeration: Let's run ...Discuss·1 like·37 reads#cybersecurity
Pratik MaliforThe Tech Deckthetechdeck.hashnode.dev·Nov 27, 2023How to Use John the Ripper in Kali LinuxJohn the Ripper is a popular and free password-cracking tool that is included in Kali Linux. It allows you to perform dictionary attacks or brute force attacks on hashed passwords. Using John the Ripper can help you recover lost passwords or test the...Discuss·2.8K readsLinuxjohn-the-ripper
Ruturajsingh Rahevarrockylab.hashnode.dev·Sep 3, 2023Essential Tools in Kali LinuxKali Linux is a popular Linux distribution designed for penetration testing, ethical hacking, and cybersecurity. It comes pre-installed with a wide range of essential tools for various security-related tasks. Here are some of the essential tools incl...Discuss·3 likestools