Learn how to crack password-protected ZIP files using John the Ripper on Kali Linux in this step-by-step cybersecurity project.
Introduction
John the Ripper is a powerful and widely used open-source password cracking tool designed to test password strength and perform security audits. In this blog, we’ll walk through a practical, hands-on cybersecurity project where we use John the Ripper in Kali Linux to crack a ZIP file password. This exercise is ideal for cybersecurity students and beginners looking to understand password hashing and cracking fundamentals in a controlled, ethical environment.
What is John the Ripper?
John the Ripper (JTR) is an advanced password recovery tool used in penetration testing and digital forensics. It supports various hash types and file formats, including ZIP, RAR, Linux shadow files, and more. It works by attempting dictionary or brute-force attacks on hashed passwords to recover the original plaintext passwords.
Why We Used a ZIP File
We used a ZIP file because it’s a widely supported and beginner-friendly archive format that allows password protection. It integrates smoothly with John the Ripper through the zip2john
utility, making it easy to extract password hashes. Compared to other formats like RAR or PDF, ZIP files are quicker to set up and crack, making them ideal for educational and demonstration purposes.
Project Setup
For this project, we created a password-protected ZIP file. We used Kali Linux as our ethical hacking environment and accessed it via Remote Desktop Protocol (RDP).
Steps Overview:
- Create a ZIP file with a password.
- Start Kali Linux with
sudo service xrdp start
. - Use
ip add
to obtain the IP address of Kali. - Connect via RDP and login.
- Transfer the ZIP file to Kali Linux Desktop.
- Use John the Ripper to extract and crack the password.
Step-by-Step Implementation
- Create a Password-Protected ZIP File : Choose an existing file and archive it into a ZIP format.
Secure the file with a password to make sure no one can access the file for sensitive information present inside the file. (e.g., 121314
).
2. Start Kali Linux Environment :
Launch Kali Linux and run the command to start the XRDP service. This allows us to start the Kali Linux Service. After entering the command, the system prompts us to enter the system password for authentication .
sudo service xrdp start
3. Finding the IP Address of Kali Linux :
To connect to the Kali Linux machine from another desktop or device — especially when retrieving files like passwords — we’ll need its IP address. This address acts as a unique identifier on the network.
To find it, open the terminal in Kali Linux and run the following command:
ip add
From the output, locate the IP address assigned to your system. In our case, the IP address was 172.26.123.22 . This IP will be used later when establishing a remote desktop session or transferring files to and from Kali Linux.
- Connecting to Kali Linux via Remote Desktop :
Now that we have the IP address of our Kali Linux machine, it’s time to connect to it remotely from another device or laptop.
On your Windows system, open the Remote Desktop Connection app (you can simply search for it in the Start menu). Once it launches, you’ll see a field where you need to enter the IP address — in our case, it’s 172.26.123.22
. After typing it in, click Connect.
A login screen will appear asking for your Kali Linux credentials. Just enter your username and password, and you’ll be logged into the Kali desktop environment — all from your remote device!
- Logging into Kali Linux :
Once the remote connection is established, you’ll be redirected to the Kali Linux login screen. Here, simply enter the username and password you set up earlier during the Kali installation.
After logging in successfully, you’ll have full access to the Kali Linux desktop environment — ready to explore its powerful tools and features, all from your remote device.
6. Transfer the ZIP File :
Once you’re logged into Kali Linux through the remote desktop, the next step is to transfer the file you previously created on your main desktop. This file needs to be copied and pasted into the Kali Linux desktop environment.
7. Preparing the File for John the Ripper :
After successfully logging into Kali Linux, the next step is to transfer the file you created earlier on your main desktop to the Kali Linux desktop. This makes the file easily accessible for the John the Ripper tool, simplifying the cracking process.
Once the file is pasted onto the Kali desktop, open the Terminal to proceed. To navigate to the desktop where the file is located, use the following command:
cd Desktop
This command changes the current working directory to the desktop, allowing you to interact with the file directly from the terminal.
8. Extracting the Hash from the ZIP File :
With the Directory now pointed to the desktop, we can begin using John the Ripper. To extract the hash from the ZIP file, use the following command:
sudo zip2john cybersecurity.zip
In this command, zip2john
is the tool that processes the ZIP file, and cybersecurity.zip
is the name of the file you want to crack. Make sure you replace the filename if your ZIP file has a different name.
After running the command, the system will prompt you to enter your sudo (admin) password for authentication. Once authenticated, the tool will output the encrypted hash of the ZIP file — this is the data that John the Ripper will attempt to crack.
9. Saving the Hash to a Text File :
The encrypted data output by the zip2john
command is in hash format, which John the Ripper can analyze and crack efficiently. To make the process smoother, we need to save this hash into a text file.
You can do this by running the following command in the terminal:
sudo zip2john cybersecurity.zip > hash.txt
This command redirects the hashed output into a file named hash.txt
. By doing this, we allow John the Ripper to focus directly on the hash file, making the password-cracking process more streamlined and effective.
10. Cracking the Password Using John the Ripper :
Now that the hash has been successfully saved into a text file (hash.txt
), it’s time to use John the Ripper to crack the password.
Run the following command in the terminal:
john hash.txt
This tells John the Ripper to begin analyzing the hash and attempt to recover the original password.
After a few moments, the tool will display the cracked password. In our case, it revealed:
121314
You’ll see the password appear alongside the filename on the terminal screen. And just like that — the password-protected ZIP file has been cracked successfully!
Results
John the Ripper successfully cracked the ZIP file password. The output displayed the plaintext password next to the filename, verifying the tool’s capability to efficiently perform dictionary-based cracking.
Conclusion
This project demonstrated how ethical hackers and cybersecurity students can use John the Ripper to test the strength of password-protected files. It reinforces the importance of using strong, complex passwords and the need for continuous security awareness.
Top comments (0)
Some comments may only be visible to logged-in visitors. Sign in to view all comments.