As we stated before in single crack mode [List.Rules:Single] method of configuration file is used. In this mode login:password are cracked by using default password-list. Single Mode is much faster than Wordlist Mode.
如我们之前在单破解模式中所述,使用配置文件的[List.Rules:Single]方法。 在这种模式下,将使用默认的密码列表来破解login:password。 单模式比单词列表模式快得多。
Linux示例 (Linux Example)
We will crack linux passwords with Single Mode. First we need the create one file by unshadowing /etc/passwd and /etc/shadow like below
我们将使用单模式破解linux密码。 首先,我们需要通过将/ etc / passwd和/ etc / shadow移开阴影来创建一个文件,如下所示
$ unshadow /etc/passwd /etc/shadow > unshadowed
After this operation we will get a file named unshadowed like below
完成此操作后,我们将获得一个名为unshadowed的文件,如下所示
root:$6$sRjaayov$u8sCzbiIxzunjyvPgRJurl24RMLfWgCKhuzGU/V0ZOWmH/JeeNMnaPOASdFN898/AEhmdTzNE7I6xDqDxeWbf.:0:0:root:/root:/bin/bash
ismail:$6$osz4Q6Ka$txKB/fjtuZhnFThDJEVKrJ8.E1LbojZYcWPuE6GGLxob.AWDoL3UXZtZ0FH98HR86ebZhGO.bZpl/qrJ2nzOP/:1000:1001::/home/ismail:/bin
/sh
Now john can help us very easily just giving file to john.
现在,约翰可以很容易地帮助我们,只需将文件交给约翰即可。
$ john unshadowed
Warning: detected hash type "sha512crypt", but the string is also recognized as "crypt"
Use the "--format=crypt" option to force loading these as that type instead
Using default input encoding: UTF-8
Loaded 2 password hashes with 2 different salts (sha512crypt, crypt(3) $6$ [SHA512 128/128 SSE2 2x])
Press 'q' or Ctrl-C to abort, almost any other key for status