john

John the Ripper is an open-source, multi-platform password cracking tool that supports several hash algorithms and attack modes for effective password auditing and testing.

John, also known as John the Ripper, is a powerful and versatile password cracking tool designed for security professionals and hackers. It is an open-source software that can be used on multiple platforms, including Windows, Linux, and macOS.

John the Ripper uses a combination of brute-force and dictionary-based attacks to crack passwords. It supports a wide range of hash algorithms, including MD5, SHA1, SHA256, and many others. The tool also supports several attack modes, including wordlist, single, and incremental attacks, which make it suitable for various cracking scenarios.

One of the most impressive features of John the Ripper is its ability to detect weak passwords. The tool uses a set of pre-defined rules and patterns to identify and crack passwords that are commonly used by users. It can also generate its own wordlists based on statistical analysis of common passwords.

Another significant advantage of John the Ripper is its flexibility. It supports multiple input and output formats, including Unix-style password files, Windows NT/2000/XP/2003 password hashes, and others. It can also be used with third-party plugins, which allow users to extend its functionality and customize it to suit their specific needs.

John the Ripper is widely used in the security industry for password auditing and testing. It is also popular among hackers and security enthusiasts who use it to crack passwords for various purposes. However, it should be noted that using John the Ripper for illegal activities is strictly prohibited.

In conclusion, John the Ripper is a powerful and versatile password cracking tool that can be used for various cracking scenarios. It offers an impressive range of features and functionalities that make it suitable for both security professionals and enthusiasts. However, it should be used responsibly and ethically to prevent any illegal activities.

Mailer

:~# mailer
Usage: /usr/sbin/mailer PASSWORD-FILE

Unique

:~# unique
Usage: unique [-v] [-inp=fname] [-cut=len] [-mem=num] OUTPUT-FILE [-ex_file=FNAME2] [-ex_file_only=FNAME2]

       reads from stdin 'normally', but can be overridden by optional -inp=
       If -ex_file=XX is used, then data from file XX is also used to
       unique the data, but nothing is ever written to XX. Thus, any data in
       XX, will NOT output into OUTPUT-FILE (for making iterative dictionaries)
       -ex_file_only=XX assumes the file is 'unique', and only checks against XX
       -cut=len  Will trim each input lines to 'len' bytes long, prior to running
       the unique algorithm. The 'trimming' is done on any -ex_file[_only] file
       -mem=num.  A number that overrides the UNIQUE_HASH_LOG value from within
       params.h.  The default is 21.  This can be raised, up to 25 (memory usage
       doubles each number).  If you go TOO large, unique will swap and thrash and
       work VERY slow

       -v is for 'verbose' mode, outputs line counts during the run

john Usage Example

Using a wordlist (–wordlist=/usr/share/john/password.lst), apply mangling rules (–rules) and attempt to crack the password hashes in the given file (unshadowed.txt):


unique Usage Example

Using verbose mode (-v), read a list of passwords (-inp=allwords.txt) and save only unique words to a file (uniques.txt):


Packages and Binaries:

john

John the Ripper is a tool designed to help systems administrators to find weak (easy to guess or crack through brute force) passwords, and even automatically mail users warning them about it, if it is desired.

Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

Installed size: 77.31 MB How to install: sudo apt install john

Dependencies:
  • john-data

  • libc6

  • libcrypt1

  • libgmp10

  • libgomp1

  • libpcap0.8

  • libssl3

  • zlib1g

SIPdump

Part of SIPcrack, A suite of tools to sniff and crack the digest authentications within the SIP protocol.


base64conv


bitlocker2john


calc_stat


cprepair


dmg2john


eapmd5tojohn


genmkvpwd


gpg2john


hccap2john


john

A tool to find weak passwords of your users


keepass2john


mailer

Script to warn users about their weak passwords





rar2john


raw2dyna


tgtsnarf



unafs

Script to warn users about their weak passwords



unique

Removes duplicates from a wordlist


unshadow

Combines passwd and shadow files


vncpcap2john


wpapcap2john


zip2john


john-data

John the Ripper is a tool designed to help systems administrators to find weak (easy to guess or crack through brute force) passwords, and even automatically mail users warning them about it, if it is desired.

This package contains architecture-independent character sets usable by john and architecture-independent scripts.

Installed size: 61.07 MB How to install: sudo apt install john-data

Dependencies:
  • python3

1password2john


7z2john


DPAPImk2john


adxcsouf2john


aem2john


aix2john


andotp2john


androidbackup2john


androidfde2john


ansible2john


apex2john


applenotes2john


aruba2john


atmail2john


axcrypt2john


bestcrypt2john


bitcoin2john


bitshares2john


bitwarden2john


bks2john


blockchain2john


ccache2john


cisco2john


cracf2john


dashlane2john


deepsound2john


diskcryptor2john


dmg2john


ecryptfs2john


ejabberd2john


electrum2john


encfs2john


enpass2john


enpass5tojohn


ethereum2john


filezilla2john


geli2john


hccapx2john


htdigest2john


ibmiscanner2john


ikescan2john


ios7tojohn


itunes_backup2john


iwork2john


kdcdump2john


keychain2john


keyring2john


keystore2john


kirbi2john


known_hosts2john


krb2john


kwallet2john


lastpass2john


ldif2john


libreoffice2john


lion2john


lotus2john


luks2john


mac2john


mcafee_epo2john


monero2john


money2john


mosquitto2john


mozilla2john


multibit2john


neo2john


office2john


openbsd_softraid2john


openssl2john


padlock2john


pcap2john


pdf2john


pem2john


pfx2john


pgpdisk2john


pgpsda2john


pgpwde2john


prosody2john


ps_token2john


pse2john


pwsafe2john


radius2john


restic2john


sap2john


sense2john


signal2john


sipdump2john


ssh2john


sspr2john


staroffice2john


strip2john


telegram2john


tezos2john


truecrypt2john


vdi2john


vmx2john


zed2john


Updated on: 2023-Mar-08


Last updated

Was this helpful?