Changes

Jump to navigation Jump to search
126 bytes added ,  10:23, 4 February 2020
m
Line 1: Line 1: −
== Install on ubuntu ==
+
==Install on ubuntu==
 
Required stuff
 
Required stuff
 
  sudo apt-get install build-essential libssl-dev
 
  sudo apt-get install build-essential libssl-dev
Line 28: Line 28:  
Test your build:
 
Test your build:
 
  ../run/john --test=0 --format=cpu
 
  ../run/john --test=0 --format=cpu
* To benchmark, drop the =0 argument to –test.
  −
* To test OpenCL or CUDA formats, or both, use –format=[cuda|opencl|cuda].
  −
* To test specific format(s) just name them. Wildcards are OK, eg. –format=lotus*
      +
*To benchmark, drop the =0 argument to –test.
 +
*To test OpenCL or CUDA formats, or both, use –format=[cuda|opencl|cuda].
 +
*To test specific format(s) just name them. Wildcards are OK, eg. –format=lotus*
   −
== Examples ==
  −
John the Ripper (Password cracker)
  −
john --wordlist=[archivodiccionario] [archivo paswords]<br />
     −
== Links ==
+
==Examples==
https://www.win.tue.nl/~aeb/linux/john/john.html
+
John the Ripper (Password cracker)<syntaxhighlight lang="bash">
http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats
+
john --wordlist=[archivodiccionario] [archivo paswords]
http://www.openwall.com/john/doc/EXAMPLES.shtml
+
john --fork=19 --session=session1 --format=NT windows_ad_hashes.dump
 +
</syntaxhighlight><br />
 +
 
 +
==Links==
 +
https://www.win.tue.nl/~aeb/linux/john/john.html<br />
 +
http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats<br />
 +
http://www.openwall.com/john/doc/EXAMPLES.shtml<br />
    
  john --wordlist=dic.txt raw_password_file.txt
 
  john --wordlist=dic.txt raw_password_file.txt
 
john --show[=LEFT]            show cracked passwords [if =LEFT, then uncracked]<br />
 
john --show[=LEFT]            show cracked passwords [if =LEFT, then uncracked]<br />

Navigation menu