Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked JohnTheRipper: 1.9.0


itsMe

Recommended Posts

This is the hidden content, please

Cita

cvsimport * refs/remotes/cvs/master: 1.9.0 release


Introduction

John the Ripper (JTR) is a widely known and verified fast password cracker, available for Windows, DOS, BeOS, and OpenVMS and many flavours of Linux.  It uses wordlists/dictionary to crack  many different types of hashes including MD5, SHA, etc.
John the Ripper: Fast Password Cracker

This password cracking tool is free and Open Source,  initially developed for the Unix operating system. But today it runs on fifteen different platforms.  Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, and a lot of other hashes and ciphers in the community-enhanced version.

For those who rather use commercial version, John the Ripper is available for following platforms:

  •     Linux: John the Ripper Pro
  •     Mac OS X: John the Ripper Pro
  •     Windows: Hash Suite
  •     Android: Hash Suite Droid

John the Ripper offers two types of attacks:

    Dictionary: It takes text string samples from wordlist, which contains dictionary of real passwords that are cracked before,  encrypting it in the same format as the password being examined (encryption algorithm/key), and comparing the output to the encrypted string. John can also perform word alterations.
    Brute force: It goes through all the possible plaintexts, hashing each one and then comparing it to the input hash. This method takes a long time to run, but it’s precious for cracking password that doesn’t appear in wordlist dictionary.


This is the hidden content, please

 

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.