Questions tagged [john-the-ripper]

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version ("jumbo"). [openwall.com]

John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version. [openwall.com]

108 questions
0
votes
1 answer

John the Ripper Character Lists

How is it possible to use or prioritize umlauted characters - ä ö ü ß Ä Ö Ü - whilst brute forcing. I'm not using any wordlist, only dozens of CPU threads via the following command : ./john --fork=64 --format=NT hash.txt Using john-1.8.0-jumbo-1.
0
votes
4 answers

John the Ripper - Can't get cracked MD5 hash to show

I'm trying to crack some MD5 hashes given in OWASP's BWA on their DVWA site. I was able to use John the Ripper and the very first time it worked fine and it showed the reversed hashes using the code: john --format=raw-md5…
therealtpain
  • 19
  • 1
  • 1
  • 2
-3
votes
1 answer

How to use hashcat to crack a password made with openssl-passwd?

I want use hashcat or John the Ripper to crack the hash of a password. I know the password was created using the following command: openssl passwd -crypt -salt tl ******** The asterisks, of course, are placeholders for the actual password. I know…
Diego
  • 3
  • 2
1 2 3 4 5 6 7
8