john-cli

Rating: 
2.6
Your rating: None Average: 2.6 (5 votes)

John the Ripper password cracker

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version.

John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance.

http://www.openwall.com/john/

IMPORTANT NOTE:

This is a community-enhanced, "jumbo" version of John the Ripper. (https://github.com/magnumripper/JohnTheRipper)
It has a lot of code, documentation, and data contributed by the
user community.  This is not "official" John the Ripper code.  It is
very easy for new code to be added to jumbo: the quality requirements
are low.  This means that you get a lot of functionality that is not
"mature" enough
or is otherwise inappropriate for the official JtR,
which in turn also means that bugs in this code are to be expected.

If you have any comments on this release or on JtR in general, please
join the john-users mailing list and post in there.

Licensing info:
http://openwall.info/wiki/john/licensing

How to contribute more code:
http://openwall.info/wiki/how-to-make-patches

How to use:

To run John, you need to supply it with some password files and
optionally specify a cracking mode, like this, using the default order
of modes and assuming that "passwd" is a copy of your password file:

    john passwd

or, to restrict it to the wordlist mode only, but permitting the use
of word mangling rules:

    john --wordlist=password.lst --rules passwd

Cracked passwords will be printed to the terminal and saved in the
file called $JOHN/john.pot (in the documentation and in the
configuration file for John, "$JOHN" refers to John's "home
directory"; which directory it really is depends on how you installed
John).  The $JOHN/john.pot file is also used to not load password
hashes that you already cracked when you run John the next time.

To retrieve the cracked passwords, run:

    john --show passwd

While cracking, you can press any key for status, or 'q' or Ctrl-C to
abort the session saving its state to a file ($JOHN/john.rec by
default).  If you press Ctrl-C for a second time before John had a
chance to complete handling of your first Ctrl-C, John will abort
immediately without saving.  By default, the state is also saved every
10 minutes to permit for recovery in case of a crash.

To continue an interrupted session, run:

    john --restore

These are just the most essential things you can do with John.  For
a complete list of command line options and for more complicated usage
examples you should refer to OPTIONS and EXAMPLES, respectively.

DEPENDENCIES:

gmp >= 6.1.2

libgomp >= 4.8.3 (already available in default SFOS repos)

BUILD NOTES:

Configured for building John the Ripper jumbo:

Target CPU ................................. armv7l NEON, 32-bit LE
AES-NI support ............................. no
Target OS .................................. linux-gnueabihf
Cross compiling ............................ no
Legacy arch header ......................... arm32le.h

Optional libraries/features found:
Memory map (share/page large files) ........ yes
Fork support ............................... yes
OpenMP support ............................. no
OpenCL support ............................. no
Generic crypt(3) format .................... yes
libgmp (PRINCE mode and faster SRP formats)  yes
128-bit integer (faster PRINCE mode) ....... no
libz (pkzip format, gpg2john) .............. yes
libbz2 (gpg2john extra decompression logic)  yes
libpcap (vncpcap2john and SIPdump) ......... yes
librexgen (regex cracking mode) ............ no
OpenMPI support (default disabled) ......... no
ZTEX USB-FPGA module 1.15y support ......... no

NOTE: All files are stored in /usr/local/bin & /usr/local/share/john

Application versions: 
AttachmentSizeDate
File john-1.8.0_jumbo-1.armv7hl.rpm36.14 MB23/01/2018 - 01:00
Changelog: 

* Resubmitted the same package version but removing unnecessary devel dependencies.

Latest 1.8.0-Jumbo version (https://github.com/magnumripper/JohnTheRipper.git) compiled for SailfishOS (armv7hl)