Hackers don’t always steal passwords, sometimes, they steal the hashes and crack them.
In this episode, we explore how hashed passwords, even when stored securely, can still be cracked if developers make common mistakes.
This video is for educational and awareness purposes only. The goal is to raise awareness of common web vulnerabilities so developers can defend against them.
▬▬ Tools Used ▬▬
- Kali Linux: Attacker machine
- Ubuntu Server: Victim
- John the Ripper: Password hash cracking tool
- Burp Suite: web security tool
▬▬ ⏱️ Chapters ▬▬
00:00 Prologue
01:41 Recap
04:20 What is a hash?
05:37 John the Ripper Intro
08:45 Finding Wordlists in SecLists
10:28 Cracking the passwords
13:00 Outro & Prevention
#ethicalhacking #johntheripper #cybersecurity
Join Neurix to get access to perks:
https://www.youtube.com/channel/UCUOlY1VUTHMdkLph5ORHF2Q/join