Filewatcher File Search File Search
Content Search
» » » » » john-1.6.tgz » Content »
pkg://john-1.6.tgz:453663/share/doc/john/  info  downloads

john…  more info»


 John the Ripper -- Password Cracker

John the Ripper is a password cracker, currently available for UNIX, DOS,
WinNT/Win95. Its primary purpose is to detect weak UNIX passwords. It has
been tested with Linux x86/Alpha/SPARC, FreeBSD x86, OpenBSD x86, Solaris
2.x SPARC and x86, Digital UNIX, AIX, HP-UX, and IRIX.

The DOS and Win32 ports are done with DJGPP and Cygnus Developer's Kit,

 How to Install

See doc/INSTALL for information on installing John on your system.

 How to Use

To run John, you need to supply it with some password files and optionally
specify a cracking mode, like this, using the default order of modes, and
assuming that passwd is a copy of your password file:

	john passwd

or, to make it use a wordlist with rules only:

	john -wordfile:/usr/dict/words -rules passwd

Cracked passwords will be printed to the terminal and saved in file called
~/john.pot (in this text '~' means John's "home directory", that is, the
directory you installed John's binary in). This file is also used not to
load passwords that you already cracked, when you run John the next time.
To retrieve the cracked passwords, run:

	john -show passwd

While cracking, you can press any key for status, or Ctrl+C to abort the
session, saving point information to a file (~/restore by default). By the
way, if you press Ctrl+C twice John will abort immediately without saving.
The point information is also saved every 10 minutes (configurable in the
configuration file, ~/john.ini) in case of a crash.

To continue an interrupted session, run:

	john -restore

Anyway, you probably should have a look at doc/OPTIONS for a list of all
the command line options, and at doc/EXAMPLES for more John usage examples
with other cracking modes.

 Features and Performance

John the Ripper is designed to be both powerful and fast. It combines
several cracking modes in one program, and is fully configurable for your
particular needs (you can even define a custom cracking mode using the
built-in compiler supporting a subset of C). Also, John is available for
several different platforms, which enables you to use the same cracker
everywhere (for example even continue a cracking session that you started
on another platform).

Out of the box, John supports (and autodetects) the following ciphertext
formats: standard and double-length DES-based, BSDI's extended DES-based,
FreeBSD's (and not only) MD5-based, and OpenBSD's Blowfish-based.

With just one extra command (required to extract the passwords), John can
crack AFS passwords and WinNT LM hashes.

Unlike other crackers, John doesn't use a crypt(3)-style routine. Instead,
it has its own highly optimized modules for different ciphertext formats
and architectures. Some of the algorithms used couldn't be implemented in
a crypt(3)-style routine: they require a more powerful interface (bitslice
DES is an example). Additionally, there're assembly routines for several
processors and architectures (special Intel Pentium version, x86 with MMX,
generic x86, Alpha EV4, SPARC V8).


The rest of documentation is located in separate files, listed here in the
recommended reading order:

INSTALL		- you've probably read it already
OPTIONS		- command line options, and additional utilities
MODES		- cracking modes: what they are
CONFIG   (*)	- how to customize
RULES    (*)	- wordlist rules syntax
EXTERNAL (*)	- defining an external mode
EXAMPLES	- usage examples -- strongly recommended
FAQ		- guess
NEWS		- history of changes
CREDITS		- credits, and how to contact me
(*) most users can safely skip these

Happy reading!
Results 1 - 1 of 1
Help - FTP Sites List - Software Dir.
Search over 15 billion files
© 1997-2017