Main Article Content


In this paper two password cracking tools namely,' John the Ripper' and 'Hydra' demonstrated in the virtual environment.For demonstration, purpose author has used VM box, Kali Linux Debian 64bit, and hydra tool. Screenshots are provided wherever necessary for readers' convenience.



Brute forace attacks Security scanning tools Hydra Active and passive attacks etc

Article Details

Author Biography

Usman Iqbal, MIT Mel

Usman is working as a masters student in MIT Mel Australia

How to Cite
U. Iqbal, “Implementation of Password Cracking Tools in Kali Linux Environment”, Ausjournal, vol. 1, no. 1, pp. 6-10, May 2020.


  1. Montoro, Massimiliano (2009). "Brute-Force Password Cracker". Archived from the original on August 20, 2013. Retrieved August 13, 2013.
  2. Bahadursingh, Roman (January 19, 2020). [Roman Bahadursingh. (2020). A Distributed Algorithm for Brute Force Password Cracking on n Processors.
  3. Lundin, Leigh (August 11, 2013). "PINs and Passwords, Part 2". Passwords. Orlando: SleuthSayers.
  4. Alexander, Steven. (June 20, 2012) The Bug Charmer: How long should passwords be?. Retrieved on January 31, 2013.