Database with John the
Ripper – Lab Exam with
(Q&A)
Create a new hash file that contains the hash to be cracked
- CORRECT ANSWER Create a new hash file that contains the hash to be cracked as
follows:
From the Favorites bar, open Terminal.
Type cat /media/root/ESD-USB/SAMhash.txt and press Enter.
Type echo.
Press the space bar.
In the Admin line of the output, select the hash in the fourth field. Each field is separated
by a colon. This is the hash value that needs to be cracked.
Right-click the hash in the fourth field of the Admin line.
Notice that the hash was pasted into the command line.
Press the space bar.
Type > SAMhash.txt.
Press Enter.
Use John the Ripper and the new hash file to crack the password
- CORRECT ANSWER Use John the Ripper and the new hash file to crack the
password as follows:
Type john SAMhash.txt and press Enter.
From the output, find the Admin's password.
In the top right, select Answer Questions.
Answer the questions.
Select Score Lab.
What is the password found in the cracked SAM?
- CORRECT ANSWER P@55word!
As the cybersecurity specialist for your company, you're performing a penetration test.
As part of this test, you're checking to see if the Security Account Manager (SAM)
passwords from a Windows system can be cracked using John the Ripper.
In this lab, your task is to crack the SAM passwords as follows: