
These wordlists provide JtR with thousands of possible passwords from which it can generate the corresponding hash values to make a high-value guess of the target password. JtR also includes its own wordlists of common passwords for 20+ languages. In our amazing Live Cyber Attack demo, the Varonis IR team demonstrates how to steal a hashed password, use JtR to find the true password, and use it to log into an administrative account. JtR autodetects the encryption on the hashed data and compares it against a large plain-text file that contains popular passwords, hashing each password, and then stopping it when it finds a match. JtR supports several common encryption technologies out-of-the-box for UNIX and Windows-based systems. Hacking is not necessarily criminal, although it can be a tool used for bad intentions.

“This really opened my eyes to AD security in a way defensive work never did.”

