Jhon The Ripper
Jhon The Ripper
Jhon The Ripper
2. Copiamos la carpeta ripper a la máquina virtual con el archivo shadow que es el que tiene
el texto encriptado.
C:\ripper\jhon179j5\run\jhon shadow.txt
Donde va generando las claves desencriptadas, en este caso usuario y contraseña.
También se hizo el comparativo con backtrack sobre una máquina virtual y se empieza a mirar las
diferentes claves con las que intenta descifrar el texto. Se abre una consola y se ejecuta
pentest/passwords/john/ john shadow.txt, donde arroja
RESPUESTA A INTERROGANTES:
Lado r longitud: cuanto mayor sea el número de bits de información en la clave, mayor
es el número de combinaciones que debe probar un atacante que use la pura fuerza
bruta. Por ejemplo, una clave compuesta de dos cifras necesita 100 intentos como
máximo para ser descubierta, mientras que una clave de cinco dígitos requiere 100.000
intentos como máximo.
El periodo de uso: una clave se vuelve más insegura cuanto mayor sea el tiempo que ha
estado en uso. Por eso es importante asegurarse de que se renuevan con suficiente
regularidad, aunque hayan sido generadas con la mayor aleatoriedad posible.
OPEN SSU
The OpenSSH source code is available free to everyone via the Internet. This
encourages code reuse and code auditing. Code review ensures the bugs can be
found and corrected by anyone. This results in secure code.
Free Licensing
OpenSSH is not covered by any restrictive license. It can be used for any and all
purposes, and that explicitly includes commercial use. The license for OpenSSH
is included in the distribution. We feel that the world would be better if routers,
network appliances, operating systems, and all other network devices had ssh
integrated into them.
All components of a restrictive nature (i.e. patents, see ssl) have been removed
from the source code; any licensed or patented components are chosen from
external libraries (e.g. OpenSSL). The IDEA symmetric cipher is no longer
available, since it is patented in many countries. Instead, we recommend people
use any of the other ciphers available. (We see no justification for using a
patented symmetric cipher, since there are many free ones).
Strong Encryption
X11 Forwarding
Port Forwarding
Strong Authentication
Agent Forwarding
Interoperability
OpenSSH versions before 2.0 support the SSH 1.3 and SSH 1.5 protocols
permitting communication with most UNIX, Windows and other commercial ssh
implementations.
As of OpenSSH 2.0, as well as supporting SSH 1.3 protocol and SSH 1.5
protocol, OpenSSH also has support for the SSH 2.0 protocol. This protocol
avoids using the RSA algorithm -- since at the time protocol 2.0 was invented the
RSA patent was still in effect -- and uses the freely useable DH and DSA
algorithms instead.
Thus, OpenSSH gives you the best of both worlds. You can interoperate
with both types of ssh clients and servers!
SFTP client and server support in both SSH1 and SSH2 protocols
OpenSSH also passes tickets for Kerberos and AFS on to the remote machine. A
user can thus access all his Kerberos and AFS services without the need to type
in a password again.
Data Compression
Data compression before encryption improves the performance for slow network
links.