john
John the Ripper is an open-source, multi-platform password cracking tool that supports several hash algorithms and attack modes for effective password auditing and testing.
John, also known as John the Ripper, is a powerful and versatile password cracking tool designed for security professionals and hackers. It is an open-source software that can be used on multiple platforms, including Windows, Linux, and macOS.
John the Ripper uses a combination of brute-force and dictionary-based attacks to crack passwords. It supports a wide range of hash algorithms, including MD5, SHA1, SHA256, and many others. The tool also supports several attack modes, including wordlist, single, and incremental attacks, which make it suitable for various cracking scenarios.
One of the most impressive features of John the Ripper is its ability to detect weak passwords. The tool uses a set of pre-defined rules and patterns to identify and crack passwords that are commonly used by users. It can also generate its own wordlists based on statistical analysis of common passwords.
Another significant advantage of John the Ripper is its flexibility. It supports multiple input and output formats, including Unix-style password files, Windows NT/2000/XP/2003 password hashes, and others. It can also be used with third-party plugins, which allow users to extend its functionality and customize it to suit their specific needs.
John the Ripper is widely used in the security industry for password auditing and testing. It is also popular among hackers and security enthusiasts who use it to crack passwords for various purposes. However, it should be noted that using John the Ripper for illegal activities is strictly prohibited.
In conclusion, John the Ripper is a powerful and versatile password cracking tool that can be used for various cracking scenarios. It offers an impressive range of features and functionalities that make it suitable for both security professionals and enthusiasts. However, it should be used responsibly and ethically to prevent any illegal activities.
Mailer
:~# mailer
Usage: /usr/sbin/mailer PASSWORD-FILEUnique
:~# unique
Usage: unique [-v] [-inp=fname] [-cut=len] [-mem=num] OUTPUT-FILE [-ex_file=FNAME2] [-ex_file_only=FNAME2]
reads from stdin 'normally', but can be overridden by optional -inp=
If -ex_file=XX is used, then data from file XX is also used to
unique the data, but nothing is ever written to XX. Thus, any data in
XX, will NOT output into OUTPUT-FILE (for making iterative dictionaries)
-ex_file_only=XX assumes the file is 'unique', and only checks against XX
-cut=len Will trim each input lines to 'len' bytes long, prior to running
the unique algorithm. The 'trimming' is done on any -ex_file[_only] file
-mem=num. A number that overrides the UNIQUE_HASH_LOG value from within
params.h. The default is 21. This can be raised, up to 25 (memory usage
doubles each number). If you go TOO large, unique will swap and thrash and
work VERY slow
-v is for 'verbose' mode, outputs line counts during the runjohn Usage Example
Using a wordlist (–wordlist=/usr/share/john/password.lst), apply mangling rules (–rules) and attempt to crack the password hashes in the given file (unshadowed.txt):
unique Usage Example
Using verbose mode (-v), read a list of passwords (-inp=allwords.txt) and save only unique words to a file (uniques.txt):
Packages and Binaries:
john
John the Ripper is a tool designed to help systems administrators to find weak (easy to guess or crack through brute force) passwords, and even automatically mail users warning them about it, if it is desired.
Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
Installed size: 77.31 MB
How to install: sudo apt install john
SIPdump
Part of SIPcrack, A suite of tools to sniff and crack the digest authentications within the SIP protocol.
base64conv
bitlocker2john
calc_stat
cprepair
dmg2john
eapmd5tojohn
genmkvpwd
gpg2john
hccap2john
john
A tool to find weak passwords of your users
keepass2john
mailer
Script to warn users about their weak passwords
rar2john
raw2dyna
tgtsnarf
unafs
Script to warn users about their weak passwords
unique
Removes duplicates from a wordlist
unshadow
Combines passwd and shadow files
vncpcap2john
wpapcap2john
zip2john
john-data
John the Ripper is a tool designed to help systems administrators to find weak (easy to guess or crack through brute force) passwords, and even automatically mail users warning them about it, if it is desired.
This package contains architecture-independent character sets usable by john and architecture-independent scripts.
Installed size: 61.07 MB
How to install: sudo apt install john-data
1password2john
7z2john
DPAPImk2john
adxcsouf2john
aem2john
aix2john
andotp2john
androidbackup2john
androidfde2john
ansible2john
apex2john
applenotes2john
aruba2john
atmail2john
axcrypt2john
bestcrypt2john
bitcoin2john
bitshares2john
bitwarden2john
bks2john
blockchain2john
ccache2john
cisco2john
cracf2john
dashlane2john
deepsound2john
diskcryptor2john
dmg2john
ecryptfs2john
ejabberd2john
electrum2john
encfs2john
enpass2john
enpass5tojohn
ethereum2john
filezilla2john
geli2john
hccapx2john
htdigest2john
ibmiscanner2john
ikescan2john
ios7tojohn
itunes_backup2john
iwork2john
kdcdump2john
keychain2john
keyring2john
keystore2john
kirbi2john
known_hosts2john
krb2john
kwallet2john
lastpass2john
ldif2john
libreoffice2john
lion2john
lotus2john
luks2john
mac2john
mcafee_epo2john
monero2john
money2john
mosquitto2john
mozilla2john
multibit2john
neo2john
office2john
openbsd_softraid2john
openssl2john
padlock2john
pcap2john
pdf2john
pem2john
pfx2john
pgpdisk2john
pgpsda2john
pgpwde2john
prosody2john
ps_token2john
pse2john
pwsafe2john
radius2john
restic2john
sap2john
sense2john
signal2john
sipdump2john
ssh2john
sspr2john
staroffice2john
strip2john
telegram2john
tezos2john
truecrypt2john
vdi2john
vmx2john
zed2john
Updated on: 2023-Mar-08
Last updated
Was this helpful?