Menu

Main Menu
Talk Get Daily Search

Member's Online

    User Name
    Password

    [ANNOUNCE] John the Ripper (latest) ...

    Reply
    Page 1 of 3 | 1   2     3   | Next
    colin.stephane | # 1 | 2012-11-30, 14:31 | Report

    Hi all,

    As requested by peterleinchen here is my first attempt to package the latest community-enhanced version of John The Ripper utility :

    John The Ripper :

    Active password cracking tool.

    Overview :

    John the Ripper is a tool designed to help systems administrators to find weak (easy to guess or crack through brute force) passwords, and even automatically mail users warning them about it, if it is desired.

    Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

    Homepage :

    http://www.openwall.com/john/

    Download packages from extra-devel :

    Activate all repositories following this tutorial : Repositories Activation

    Then, as usual, as root, install with :

    Code:
    -bash-2.05b# apt-get install john && john --help
    Reading package lists... Done
    Building dependency tree       
    Reading state information... Done
    Suggested packages:
      wordlist
    The following NEW packages will be installed:
      john
    0 upgraded, 1 newly installed, 0 to remove and 19 not upgraded.
    Need to get 0B/1198kB of archives.
    After this operation, 2363kB of additional disk space will be used.
    Selecting previously deselected package john.
    (Reading database ... 47501 files and directories currently installed.)
    Unpacking john (from .../john_1.7.9-jumbo-7-1maemo0_armel.deb) ...
    Setting up john (1.7.9-jumbo-7-1maemo0) ...
    John the Ripper password cracker, ver: 1.7.9-jumbo-7 [generic]
    Copyright (c) 1996-2012 by Solar Designer and others
    Homepage: http://www.openwall.com/john/
    
    Usage: john [OPTIONS] [PASSWORD-FILES]
    --config=FILE             use FILE instead of john.conf or john.ini
    --single[=SECTION]        "single crack" mode
    --wordlist[=FILE] --stdin wordlist mode, read words from FILE or stdin
                      --pipe  like --stdin, but bulk reads, and allows rules
    --loopback[=FILE]         like --wordlist, but fetch words from a .pot file
    --dupe-suppression        suppress all dupes in wordlist (and force preload)
    --encoding=NAME           input data is non-ascii (eg. UTF-8, ISO-8859-1).
                              For a full list of NAME use --list=encodings
    --rules[=SECTION]         enable word mangling rules for wordlist modes
    --incremental[=MODE]      "incremental" mode [using section MODE]
    --markov[=OPTIONS]        "Markov" mode (see doc/MARKOV)
    --external=MODE           external mode or word filter
    --stdout[=LENGTH]         just output candidate passwords [cut at LENGTH]
    --restore[=NAME]          restore an interrupted session [called NAME]
    --session=NAME            give a new session the NAME
    --status[=NAME]           print status of a session [called NAME]
    --make-charset=FILE       make a charset file. It will be overwritten
    --show[=LEFT]             show cracked passwords [if =LEFT, then uncracked]
    --test[=TIME]             run tests and benchmarks for TIME seconds each
    --users=[-]LOGIN|UID[,..] [do not] load this (these) user(s) only
    --groups=[-]GID[,..]      load users [not] of this (these) group(s) only
    --shells=[-]SHELL[,..]    load users with[out] this (these) shell(s) only
    --salts=[-]COUNT[:MAX]    load salts with[out] COUNT [to MAX] hashes
    --pot=NAME                pot file to use
    --format=NAME             force hash type NAME: afs bf bfegg bsdi crc32 des dmd5 dominosec dragonfly3-32 dragonfly3-64 dragonfly4-32 dragonfly4-64 drupal7 dummy dynamic_n epi episerver gost hdaa hmac-md5 hmac-sha1 hmac-sha224 hmac-sha256 hmac-sha384 hmac-sha512 hmailserver ipb2 keepass keychain krb4 krb5 lm lotus5 md4-gen md5 md5ns mediawiki mscash mscash2 mschapv2 mskrb5 mssql mssql05 mysql mysql-sha1 nethalflm netlm netlmv2 netntlm netntlmv2 nsldap nt nt2 odf office oracle oracle11 osc pdf phpass phps pix-md5 pkzip po pwsafe racf rar raw-md4 raw-md5 raw-md5u raw-sha raw-sha1 raw-sha1-linkedin raw-sha224 raw-sha256 raw-sha384 raw-sha512 salted-sha1 sapb sapg sha1-gen sha256crypt sha512crypt sip ssh sybasease trip vnc wbb3 wpapsk xsha xsha512 zip
    --list=WHAT               list capabilities, see --list=help or doc/OPTIONS
    --save-memory=LEVEL       enable memory saving, at LEVEL 1..3
    --mem-file-size=SIZE      size threshold for wordlist preload (default 5 MB)
    --nolog                   disables creation and writing to john.log file
    --crack-status            emit a status line whenever a password is cracked
    --max-run-time=N          gracefully exit after this many seconds
    --regen-lost-salts=N      regenerate lost salts (see doc/OPTIONS)
    -bash-2.05b#
    After successful installation, just use it !!!


    Hope you like it ...

    A++

    Edit | Forward | Quote | Quick Reply | Thanks

    Last edited by colin.stephane; 2012-11-30 at 14:47. Reason: Typo's ...
    The Following 21 Users Say Thank You to colin.stephane For This Useful Post:
    AMD, carbonjha, humble, ibrakalifa, imo, khan.orak, MeeNu, mr_pingu, peterleinchen, reinob, shawnjefferson, sixwheeledbeast, smoothc, Sourav.dubey, StefanL, sunyakram, szopin, thedead1440, Tiran, xes, ZogG

     
    peterleinchen | # 2 | 2012-11-30, 14:58 | Report

    O well,
    I do feel honored to be mentioned in OP. (especially as I did not do anything)
    Just asked politely for an update, not requesting
    But it is nice to have an own JTR related thread now.

    Merci beaucoup

    --edit
    confirming the working of newer version, recognizing of hash types and jumbo pack

    Edit | Forward | Quote | Quick Reply | Thanks

    Last edited by peterleinchen; 2012-11-30 at 15:31.
    The Following 3 Users Say Thank You to peterleinchen For This Useful Post:
    khan.orak, reinob, ZogG

     
    colin.stephane | # 3 | 2012-11-30, 15:48 | Report

    Originally Posted by peterleinchen View Post
    O well,
    I do feel honored to be mentioned in OP. (especially as I did not do anything)
    Just asked politely for an update, not requesting
    But it is nice to have an own JTR related thread now.

    Merci beaucoup

    --edit
    confirming the working of newer version, recognizing of hash types and jumbo pack
    No problem,

    Welcome to the open-source world ...

    A++

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following 2 Users Say Thank You to colin.stephane For This Useful Post:
    peterleinchen, ZogG

     
    sunyakram | # 4 | 2012-11-30, 18:55 | Report

    thank you colin.stephane.but tutorial for use?bcz am using it 1st time

    Edit | Forward | Quote | Quick Reply | Thanks

     
    tonypower88 | # 5 | 2012-11-30, 19:12 | Report

    thanks a lot

    jtr is a great tool, but n900 computing power is poor to crack hashes it takes a long time

    Edit | Forward | Quote | Quick Reply | Thanks

     
    www.rzr.online.fr | # 6 | 2012-11-30, 19:26 | Report

    for harmattan users you can install it in shared repo too ...

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following User Says Thank You to www.rzr.online.fr For This Useful Post:
    Jordi

     
    colin.stephane | # 7 | 2012-11-30, 19:44 | Report

    Originally Posted by sunyakram View Post
    thank you colin.stephane.but tutorial for use?bcz am using it 1st time
    Have look here : John The Ripper

    A++

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following 3 Users Say Thank You to colin.stephane For This Useful Post:
    misiak, peterleinchen, sunyakram

     
    StefanL | # 8 | 2012-11-30, 19:58 | Report

    Originally Posted by sunyakram View Post
    thank you colin.stephane.but tutorial for use?bcz am using it 1st time
    Dude, did you even read the first post? Go to the website, plenty of info to be found on there.

    Originally Posted by colin.stephane View Post
    Homepage :

    http://www.openwall.com/john/
    If you are interested in a working example application, check out implementation in faircrack (follow my signature). If everything else fails, google is still your friend. Devs usually don't appreciate "lazy" people, but are more than willing to help out people who have shown some basic initiative (see the above minimum basic initiative requirements). :P

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following 3 Users Say Thank You to StefanL For This Useful Post:
    MeeNu, peterleinchen, sunyakram

     
    MeeNu | # 9 | 2012-11-30, 21:56 | Report

    Thanks for this great app!
    But......i shall be boycotting it

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Rabah_vip | # 10 | 2012-12-02, 18:12 | Report

    sorry but i don't know how to install it on nokia n9 please someone can help me with ?

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Page 1 of 3 | 1   2     3   | Next
vBulletin® Version 3.8.8
Normal Logout