How to use the John the Ripper password cracker

<section class=”section main-article-chapter” data-menu-title=”What is John the Ripper?”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>What is John the Ripper?</h2>
<p>John the Ripper is an offline password cracking tool that was <a href=”https://www.openwall.com/lists/john-users/2015/09/10/4″ target=”_blank” rel=”noopener”>developed in 1996</a> by Openwall Project. It is notable for supporting a diversity of password formats. This tool enables security practitioners to crack passwords, regardless of encrypted or <a href=”https://www.techtarget.com/searchdatamanagement/definition/hashing”>hashed</a> passwords, message authentication codes (<a href=”https://www.techtarget.com/searchsecurity/definition/message-authentication-code-MAC”>MACs</a>) and hash-based MACs (<a href=”https://www.techtarget.com/searchsecurity/definition/Hash-based-Message-Authentication-Code-HMAC”>HMACs</a>), or other artifacts of the authentication process.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<figure class=”main-article-image full-col” data-img-fullsize=”https://www.techtarget.com/rms/onlineimages/johntheripper-figure1-h.jpg”>
<img data-src=”https://www.techtarget.com/rms/onlineimages/johntheripper-figure1-h_mobile.jpg” class=”lazy” data-srcset=”https://www.techtarget.com/rms/onlineimages/johntheripper-figure1-h_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/johntheripper-figure1-h.jpg 1280w” alt=”Screenshot of the password formats John the Ripper supports”>
<figcaption>
<i class=”icon pictures” data-icon=”z”></i>Figure 1. At the time of writing, John the Ripper supports this long list of password formats.
</figcaption>
<div class=”main-article-image-enlarge”>
<i class=”icon” data-icon=”w”></i>
</div>
</figure>
<p>The tool is also notable for its ubiquity and accessibility. It’s included in the default repositories for many Linux distributions, including Debian and Ubuntu, and installed by default in most penetration testing distributions, including Kali and BlackArch. A snap install of it is available, along with multiple con

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: