Difference between revisions of "Linux: John"

From RHS Wiki
Jump to navigation Jump to search
Tag: visualeditor
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
John the Ripper (Password cracker)
+
==Install on ubuntu==
john --wordlist:[archivodiccionario] [archivo paswords]<br />
+
Required stuff
 +
sudo apt-get install build-essential libssl-dev
 +
Recommended (extra formats and performance)
 +
sudo apt-get install yasm libgmp-dev libpcap-dev libnss3-dev libkrb5-dev pkg-config
 +
If you have an NVIDIA GPU (CUDA and OpenCL support)
 +
sudo apt-get install nvidia-cuda-toolkit nvidia-opencl-dev
 +
If you have an AMD GPU (or want to use CPU as OpenCL device)
 +
sudo apt-get install fglrx-updates-dev
 +
Optional MPI support
 +
sudo apt-get install libopenmpi-dev openmpi-bin
 +
Optional REXGEN support (additional cracking modes)<br />
 +
Cmake needs to be 2.8.12 or above. Ubuntu 14.04 LTS has this.
 +
  sudo apt-get install subversion cmake bison flex
 +
  mkdir ~/src && cd ~/src
 +
  svn checkout http://rexgen.googlecode.com/svn/trunk/ rexgen
 +
  cd rexgen/src
 +
  mkdir build && cd build
 +
  cmake ..
 +
  make && sudo make install
 +
Clone latest bleeding-edge Jumbo and build:
 +
  cd ~/src
 +
  git clone git://github.com/magnumripper/JohnTheRipper -b bleeding-jumbo john
 +
Build
 +
  cd ~/src/john/src
 +
  # For MPI, use './configure --enable-mpi' below
 +
  ./configure && make -s clean && make -sj4
 +
Test your build:
 +
../run/john --test=0 --format=cpu
 +
 
 +
*To benchmark, drop the =0 argument to –test.
 +
*To test OpenCL or CUDA formats, or both, use –format=[cuda|opencl|cuda].
 +
*To test specific format(s) just name them. Wildcards are OK, eg. –format=lotus*
 +
 
 +
 
 +
==Examples==
 +
John the Ripper (Password cracker)<syntaxhighlight lang="bash">
 +
john --wordlist=[archivodiccionario] [archivo paswords]
 +
john --fork=19 --session=session1 --format=NT windows_ad_hashes.dump
 +
</syntaxhighlight><br />
 +
 
 +
==Links==
 +
https://www.win.tue.nl/~aeb/linux/john/john.html<br />
 +
http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats<br />
 +
http://www.openwall.com/john/doc/EXAMPLES.shtml<br />
 +
 
 +
john --wordlist=dic.txt raw_password_file.txt
 
john --show[=LEFT]            show cracked passwords [if =LEFT, then uncracked]<br />
 
john --show[=LEFT]            show cracked passwords [if =LEFT, then uncracked]<br />

Latest revision as of 10:23, 4 February 2020

Install on ubuntu

Required stuff

sudo apt-get install build-essential libssl-dev

Recommended (extra formats and performance)

sudo apt-get install yasm libgmp-dev libpcap-dev libnss3-dev libkrb5-dev pkg-config

If you have an NVIDIA GPU (CUDA and OpenCL support)

sudo apt-get install nvidia-cuda-toolkit nvidia-opencl-dev

If you have an AMD GPU (or want to use CPU as OpenCL device)

sudo apt-get install fglrx-updates-dev

Optional MPI support

sudo apt-get install libopenmpi-dev openmpi-bin

Optional REXGEN support (additional cracking modes)
Cmake needs to be 2.8.12 or above. Ubuntu 14.04 LTS has this.

 sudo apt-get install subversion cmake bison flex
 mkdir ~/src && cd ~/src
 svn checkout http://rexgen.googlecode.com/svn/trunk/ rexgen
 cd rexgen/src
 mkdir build && cd build
 cmake ..
 make && sudo make install

Clone latest bleeding-edge Jumbo and build:

 cd ~/src
 git clone git://github.com/magnumripper/JohnTheRipper -b bleeding-jumbo john

Build

 cd ~/src/john/src
 # For MPI, use './configure --enable-mpi' below
 ./configure && make -s clean && make -sj4

Test your build:

../run/john --test=0 --format=cpu
  • To benchmark, drop the =0 argument to –test.
  • To test OpenCL or CUDA formats, or both, use –format=[cuda|opencl|cuda].
  • To test specific format(s) just name them. Wildcards are OK, eg. –format=lotus*


Examples

John the Ripper (Password cracker)

john --wordlist=[archivodiccionario] [archivo paswords]
john --fork=19 --session=session1 --format=NT windows_ad_hashes.dump


Links

https://www.win.tue.nl/~aeb/linux/john/john.html
http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats
http://www.openwall.com/john/doc/EXAMPLES.shtml

john --wordlist=dic.txt raw_password_file.txt

john --show[=LEFT] show cracked passwords [if =LEFT, then uncracked]