pseudomonas dcif that show user name
or we will be targeting
hacker loy in this case domain work
group all right and slash
182.168.0.108. so this is the target ip
address slash videos
mnt slash
local underscore share let's hit enter
on that let's enter the password
for hacker loy
all right let's go into mount local
underscore share
ls
oh we got an interesting file here
let's take a look at that hackaloy
salary.dlcx
wow this looks pretty exciting let's
open up a file explorer on this
let's go over into that exactly where we
are now file system under mnt
double click on that
we have local share
acroloid cell and we don't docx double
clicked on it
oh gosh
password protection hacker law is pretty
smart he has a password protection for
the docx file so that we cannot know
what is his actual salary so what should
we do then but don't worry about it
whatever the case is whenever you see a
file that is password protected we have
several options particularly for files
that you own or files that you in a way
when you say own you could be
meaning that you really own a file that
you created it and you have permissions
to it or
that you hacked into the computer and is
somehow owned into the machine and you
have now ownership
of the documents and all the folders and
everything and the computer is owned
okay so whichever case is what we can do
is we can launch brute force attack
against the path protection field yes i
know you must be really interested and
curious about what exactly is hackers
lloyd's salary isn't it
and more importantly what exactly is his
password
[Music]
oh remember hacking is illegal if you
want to do any of these hacking
activities only do it in your own home
hacking lab environment else if you get
caught once again do not tell them that
you know who is hacker loy and remember
to smash the like button because what we
are going to do today is to hack hacker
loy and remember subscribe to the
channel and turn on notifications so
that anytime someone gets hacked sorry i
mean whenever there's a new hacking
tutorial you get notified first so that
you can learn everything about adequate
hacking and penetration testing so going
back to the tutorial right here you can
see the following enter password so fret
not what we can do now is go ahead and
click cancel and we can use the good old
copy and paste so do a right click
copy or i go back to desktop and what i
can do now is paste it right here so we
have the file right here hackaloy
salary.docx so moving back into terminal
what we want to do now is define where
exactly is john all right so what you
can do is you're going to have to locate
office to john and hit enter on this and
we can see the following we have usr
share john office to john.py so let's go
ahead and change directory there so you
can enter cd usr share john and once
you're in this particular directory you
can enter ls
my goodness you can see all the options
available for us so we have pdf to john
we have pcapp to john we have paz gen
office to john has so many options
available for us to convert all these
different types of format
into options for us to begin the first
attack against them so this is pretty
scary the next thing we want to do now
is to go ahead and use office to john to
launch the attack so you can enter
python tree followed by office to john
and then what we want to do now is to go
ahead and target the file that we have
copied over into so the first thing you
can do on the python 3 office to john
dot py what you can do now is go ahead
and enter and target the file which is
desktop this is where we save the file
into all right now we have hackerloy
followed by
salary.dlcx okay and and then you want
to output this into a particular file
right so in this case we want to output
it into likewise desktop and we want to
save it as say for example
2bhactedhash.txt
all right so go ahead and hit enter in
three two one hit enter on that and
that's it we're done and all you got to
do is now enter cat followed by
desktop where the file is saved to be
hacked
dot txt hit enter on this and we can see
the following we have hacker loy
salary.docx it's office 2013 and the
rest of the other values that we'll be
going after okay so what we can do now
is go ahead and use john as part of
attacking the system and good news today
i have a secret file that i want to
share with you about lists of really
interesting passwords that will amaze
you so what we want to do now is to go
ahead and target this particular hash
file that we have generated and here as
i mentioned earlier i want to share
something really interesting so you
would have seen rockq.txt several times
we contain
all of those commonly used passwords
okay so if i go ahead and enter say for
example hate usr share word list
followed by rocky.txt so you have all
these commonly used passwords that a lot
of people are using and you can see this
from all of those password data doms
right so that's really something that
you can use easily as part of launching
all sorts of attack using common word
list so what i have here let's go ahead
and change directory to say for example
usr share
wordless and i enter ls i have a really
interesting file here called secret
hackerlogpasswordlist.txt
you want to know what's inside of this
let me show you okay so i can enter cat
secret hackerloy passwordlist.txt hit
enter on this
and we have three really interesting
passwords hacker law is very handsome
hacker law is extremely handsome and
hacker loan is very good looking what do
you think which one of this is going to
be the password use to secure the
particular file that we saw earlier so
now moving forward what we want to do
now is go ahead and target the file so
you can enter john followed by dash dash
or word list
equal and in this case we'll use usr
share all right wordless followed by
secret
hacker law password list
and then what we want to do now is to go
ahead and target hash file that we have
created so you can enter slash desktop
followed by
2bhackhash.txt and hit enter on this and
three two one
we can see the following hacker lloyd is
very handsome
is the password used for this file well
don't believe me let's go ahead and open
it up so let's go back over into desktop
okay let's double click onto the file
over here let's go ahead and enter it
hacker loy is very handsome click ok
we open up the file
that's it
we are able to get access into the file
by launching a brute force attack
using
those password lists that we have
obtained
and now here we are we have opened up
the file now the second option that we
have is using hashcat so i'm using my
graphical processing unit in my host
machine so we have to transfer the hash
file over
into our host machine so that we can
take advantage of the gpu that we have
to launch the attack against this file
so here is what we are going to do so
the first thing we can do is transfer to
follow over so what you want to do now
is go ahead and enter the following okay
so let me just go ahead and reset this
so we can enter sudo
and we can enter cp which is copy and we
want to target the file over here which
is of course desktop to be hacked
dot txt and we're going over to slash
mnt slash local underscore share and go
ahead and hit enter on this and that's
it we have transferred the file over so
if i go over to local share you can see
the following over here to be hacked
hash.txt so this is the file that we are
targeting so what i can do now is to go
ahead and go back to my main machine and
in my main machine what i'm going to do
now is to go ahead and copy this
particular file all right to be hacked
and i'm going to copy it and i'm going
to throw it over into my hashcat folder
okay i can paste it right here 2b hack
hash.txt as you can see right here and
of course we have the same secret
hackloypasswordlist.txt so i can double
click on this and once again you can see
the tree password field that we have
here all right so we are going to be
using this once again to launch the
attack against the file so now moving
over into command prompt we are in
hashcat folder so what i want to do now
is explain a little more right so
hashcat is the world's fastest and most
advanced password recovery tool i really
like the word recovery okay so as you
scroll down further you can see the
following we have a lot of options
available for us to launch the attack
all right so we have attack mode okay
and of course we have to declare
the kind of mode that we have because of
the file that we are targeting so this
is office
all right 2013 which is 9600 that we'll
be using so it's a document type so you
can see right here these are the options
available for us to open up and brute
force attack a lot of different types of
hash values of file or what we call hash
modes okay so this is really interesting
and we can even do it for wireless
hacking wouldn't you like that as a
future tutorial yeah okay so now going
back into command prompt so this is what
we will do as part of targeting the file
okay so what we can do now is go ahead
and enter the following okay hashcat
all right then we have
hashcat.exe right so hashcat.exe and
we'll target and use the attack mode of
dash a0 and then we can have dash m9600
so we got them this value from the hash
value earlier and what we can do now is
enter that username because there is a
file name earlier dash o and we want to
target into say crack
pass.txt
and then of course snakes is the target
file that we're going after of course in
this case to be hacked
all right 2b hack.hash.txt
followed by all right the word list that
we have so remember the secret word list
that we have created secret hacker law
password list dot txt and you can go
ahead and hit enter on this
and you can see the following all right
we have the following running right now
and it has stated all right the
following candidate number one okay so
you has to follow hacker law it's very
handsome heckler is very good looking so
we ran through that so what we can do
now is to go ahead and see the file
that's available for us okay so we have
created file which is of course
the output so in this case what we want
to do is to open up that particular file
which has now
all of the corrected values okay that's
available for us which is under here
right correct pass.txt so all i got to
do now is go ahead and enter the
following which is type crackpass.txt
okay and go ahead and hit enter on this
and you can see the following right
hecklerloy is very handsome this
is the password to open up the file i'm
really impressed with what you have
achieved today you managed to hack into
hacker lloyd's file well done good job
i'm really proud of you so once again i
hope you learned something valuable in
today's tutorial if you have any
questions feel free to leave a comment
below and we'll try our best to answer
any of your questions remember smash the
like button get notification turn on and
always be subscribed okay so that you
can be kept abreast of the latest
article hacking and penetration testing
tutorial thank you so much once again
for watching