O'Reilly logo

Kali Linux 2: Windows Penetration Testing by Bo Weaver, Wolf Halton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

My friend Johnny

First we will talk about my friend Johnny. Johnny is a GUI frontend for my other friend John. For most password cracking tasks, this is an easy way to use Johnny. It uses the normal defaults for most password cracking sessions. Once you have captured some hashes, save them to a text file and open Johnny. As shown in the following image, Johnny can be found under Applications | 05 – Password Attacks | johnny:

My friend Johnny

Getting to Johnny in Kali 2.x is simpler. See the following image:

My friend Johnny

We are using the password hashes from a previous exploit earlier ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required