Linux: John

From RHS Wiki
Revision as of 10:23, 4 February 2020 by Rafahsolis (talk | contribs) (→‎Examples)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Install on ubuntu

Required stuff

sudo apt-get install build-essential libssl-dev

Recommended (extra formats and performance)

sudo apt-get install yasm libgmp-dev libpcap-dev libnss3-dev libkrb5-dev pkg-config

If you have an NVIDIA GPU (CUDA and OpenCL support)

sudo apt-get install nvidia-cuda-toolkit nvidia-opencl-dev

If you have an AMD GPU (or want to use CPU as OpenCL device)

sudo apt-get install fglrx-updates-dev

Optional MPI support

sudo apt-get install libopenmpi-dev openmpi-bin

Optional REXGEN support (additional cracking modes)
Cmake needs to be 2.8.12 or above. Ubuntu 14.04 LTS has this.

 sudo apt-get install subversion cmake bison flex
 mkdir ~/src && cd ~/src
 svn checkout http://rexgen.googlecode.com/svn/trunk/ rexgen
 cd rexgen/src
 mkdir build && cd build
 cmake ..
 make && sudo make install

Clone latest bleeding-edge Jumbo and build:

 cd ~/src
 git clone git://github.com/magnumripper/JohnTheRipper -b bleeding-jumbo john

Build

 cd ~/src/john/src
 # For MPI, use './configure --enable-mpi' below
 ./configure && make -s clean && make -sj4

Test your build:

../run/john --test=0 --format=cpu
  • To benchmark, drop the =0 argument to –test.
  • To test OpenCL or CUDA formats, or both, use –format=[cuda|opencl|cuda].
  • To test specific format(s) just name them. Wildcards are OK, eg. –format=lotus*


Examples

John the Ripper (Password cracker)

john --wordlist=[archivodiccionario] [archivo paswords]
john --fork=19 --session=session1 --format=NT windows_ad_hashes.dump


Links

https://www.win.tue.nl/~aeb/linux/john/john.html
http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats
http://www.openwall.com/john/doc/EXAMPLES.shtml

john --wordlist=dic.txt raw_password_file.txt

john --show[=LEFT] show cracked passwords [if =LEFT, then uncracked]