当前位置: 首页 > 软件库 > 管理和监控 > 安全相关 >

john

授权协议 Readme
开发语言 C/C++
所属分类 管理和监控、 安全相关
软件类型 开源软件
地区 不详
投 递 者 夹谷斌蔚
操作系统 跨平台
开源组织
适用人群 未知
 软件概览

John the Ripper

This is the community-enhanced, "jumbo" version of John the Ripper.It has a lot of code, documentation, and data contributed by jumbodevelopers and the user community. It is easy for new code to be addedto jumbo, and the quality requirements are low, although lately we'vestarted subjecting all contributions to quite some automated testing.This means that you get a lot of functionality that is not necessarily"mature", which in turn means that bugs in this code are to be expected.

John the Ripper homepage is:

https://www.openwall.com/john/

If you have any comments on this release or on JtR in general, pleasejoin the john-users mailing list and post in there:

https://www.openwall.com/lists/john-users/

For contributions to John the Ripper jumbo, please use pull requests onGitHub:

https://github.com/openwall/john/blob/bleeding-jumbo/CONTRIBUTING.md

Included below is basic John the Ripper core documentation.


John the Ripper password cracker.

John the Ripper is a fast password cracker, currently available formany flavors of Unix, macOS, Windows, DOS, BeOS, and OpenVMS (the latterrequires a contributed patch). Its primary purpose is to detect weakUnix passwords. Besides several crypt(3) password hash types mostcommonly found on various Unix flavors, supported out of the box areKerberos/AFS and Windows LM hashes, as well as DES-based tripcodes, plushundreds of additional hashes and ciphers in "-jumbo" versions.

How to install.

See INSTALL for information on installing John on your system.

How to use.

To run John, you need to supply it with some password files andoptionally specify a cracking mode, like this, using the default orderof modes and assuming that "passwd" is a copy of your password file:

john passwd

or, to restrict it to the wordlist mode only, but permitting the useof word mangling rules:

john --wordlist=password.lst --rules passwd

Cracked passwords will be printed to the terminal and saved in thefile called $JOHN/john.pot (in the documentation and in theconfiguration file for John, "$JOHN" refers to John's "homedirectory"; which directory it really is depends on how you installedJohn). The $JOHN/john.pot file is also used to not load passwordhashes that you already cracked when you run John the next time.

To retrieve the cracked passwords, run:

john --show passwd

While cracking, you can press any key for status, or 'q' or Ctrl-C toabort the session saving its state to a file ($JOHN/john.rec bydefault). If you press Ctrl-C for a second time before John had achance to complete handling of your first Ctrl-C, John will abortimmediately without saving. By default, the state is also saved every10 minutes to permit for recovery in case of a crash.

To continue an interrupted session, run:

john --restore

These are just the most essential things you can do with John. Fora complete list of command line options and for more complicated usageexamples you should refer to OPTIONS and EXAMPLES, respectively.

Please note that "binary" (pre-compiled) distributions of John mayinclude alternate executables instead of just "john". You may need tochoose the executable that fits your system best, e.g. "john-omp" totake advantage of multiple CPUs and/or CPU cores.

Features.

John the Ripper is designed to be both feature-rich and fast. Itcombines several cracking modes in one program and is fullyconfigurable for your particular needs (you can even define a customcracking mode using the built-in compiler supporting a subset of C).Also, John is available for several different platforms which enablesyou to use the same cracker everywhere (you can even continue acracking session which you started on another platform).

Out of the box, John supports (and autodetects) the following Unixcrypt(3) hash types: traditional DES-based, "bigcrypt", BSDI extendedDES-based, FreeBSD MD5-based (also used on Linux and in Cisco IOS), andOpenBSD Blowfish-based (now also used on some Linux distributions andsupported by recent versions of Solaris). Also supported out of the boxare Kerberos/AFS and Windows LM (DES-based) hashes, as well as DES-basedtripcodes.

When running on Linux distributions with glibc 2.7+, John 1.7.6+additionally supports (and autodetects) SHA-crypt hashes (which areactually used by recent versions of Fedora and Ubuntu), with optionalOpenMP parallelization (requires GCC 4.2+, needs to be explicitlyenabled at compile-time by uncommenting the proper OMPFLAGS line nearthe beginning of the Makefile).

Similarly, when running on recent versions of Solaris, John 1.7.6+supports and autodetects SHA-crypt and SunMD5 hashes, also withoptional OpenMP parallelization (requires GCC 4.2+ or recent Sun Studio,needs to be explicitly enabled at compile-time by uncommenting theproper OMPFLAGS line near the beginning of the Makefile and at runtimeby setting the OMP_NUM_THREADS environment variable to the desirednumber of threads).

"-jumbo" versions add support for hundreds of additional hash and ciphertypes, including fast built-in implementations of SHA-crypt and SunMD5,Windows NTLM (MD4-based) password hashes, various macOS and Mac OS Xuser password hashes, fast hashes such as raw MD5, SHA-1, SHA-256, andSHA-512 (which many "web applications" historically misuse forpasswords), various other "web application" password hashes, various SQLand LDAP server password hashes, and lots of other hash types, as wellas many non-hashes such as SSH private keys, S/Key skeykeys files,Kerberos TGTs, encrypted filesystems such as macOS .dmg files and"sparse bundles", encrypted archives such as ZIP (classic PKZIP andWinZip/AES), RAR, and 7z, encrypted document files such as PDF andMicrosoft Office's - and these are just some examples. To load some ofthese larger files for cracking, a corresponding bundled *2john programshould be used first, and then its output fed into JtR -jumbo.

Graphical User Interface (GUI).

There is an official GUI for John the Ripper: Johnny.

Despite the fact that Johnny is oriented onto JtR core, all basicfunctionality is supposed to work in all versions, including jumbo.

Johnny is a separate program, therefore you need to have John the Ripperinstalled in order to use it.

More information about Johnny and its releases is on the wiki:

https://openwall.info/wiki/john/johnny

Documentation.

The rest of documentation is located in separate files, listed here inthe recommended order of reading:

  • INSTALL - installation instructions
  • OPTIONS - command line options and additional utilities
  • MODES - cracking modes: what they are
  • CONFIG (*) - how to customize
  • RULES (*) - wordlist rules syntax
  • EXTERNAL (*) - defining an external mode
  • EXAMPLES - usage examples - strongly recommended
  • FAQ - guess
  • CHANGES (*) - history of changes
  • CONTACT (*) - how to contact the author or otherwise obtain support
  • CREDITS (*) - credits
  • LICENSE - copyrights and licensing terms
  • COPYING - GNU GPL version 2, as referenced by LICENSE above

(*) most users can safely skip these.

There are a lot of additional documentation files in jumbo's "doc"directory, which you'll also want to explore.

Happy reading!

  • john 是一款大受欢迎的、免费的开源软件、基于字典的密码破解工具。用于在已知密文的情况下尝试破解出明文的破解密码软件,支持目前大多数的加密算法,如 DES 、 MD4 、 MD5 等。 John 支持字典破解方式和暴力破解方式。它支持多种不同类型的系统架构,包括 Unix 、 Linux 、 Windows 、 DOS 模式、 BeOS 和 OpenVMS ,主要目的是破解不够牢固的 Unix/

  • 目的 john解密rar密码(不是那种未授权带密码的) 实验过程 首先你要有一个带密码的rar文件,使用rar2john算出密码hash # rar2john Nessus.rar Created directory: /root/.john Nessus.rar:$rar5$16$0664a3a72b1302f2668e54ffdcf087ad$15$9914c9ce86ec5c93eb

  • 描述:   查找用户弱密码的工具。   本手册页简要介绍了john命令。 该手册页是为Debian GNU / Linux发行版编写的,因为原始程序没有手册页。 约翰,又名John Ripper,是一种在服务器中查找用户弱密码的工具。 John可以使用字典或某种搜索模式以及密码文件来检查密码。 John支持不同的破解模式,并了解许多密文格式,例如几种DES变体,MD5和河豚。 它还可以用于提取AF

  • Step1 提取压缩包的hash文件 ┌──(kali㉿kali)-[~/Pictures/output_Wed_May__4_21_45_49_2022/zip/111] └─$ zip2john passwd.zip >>passwd2.txt ver 2.0 passwd.zip/passwd.txt PKZIP Encr: TS_chk, cmplen=33, decmplen=22, c

  • 目录 1. 通过 rar2john 工具输出 rar 文件 hash 2. 通过 john 工具进行 rar 文件爆破 3. 查看爆破的密码  

 相关资料
  • 问题内容: 我是Angular的新手,我想从一开始就学习良好的做法。我遇到了三个 Angular样式指南 ,它们似乎都很棒。我想知道 哪一种最 适合我,但是我无能为力,因为我对大型Angular应用程序经验不足。 那么哪一个是最好的呢?甚至不是更好,还是更直观/在开发过程中引起的问题更少?也许你们中的一些人对他们都有经验,可以指出他们的优缺点? 链接: 托德·莫托的:https : //githu

  • 本文向大家介绍使用MongoDB随机化唯一数据,并以单词John开头放置emailid的值,包括了使用MongoDB随机化唯一数据,并以单词John开头放置emailid的值的使用技巧和注意事项,需要的朋友参考一下 要随机化唯一数据,请在MongoDB中使用Math.random()。让我们创建一个包含文档的集合- 在方法的帮助下显示集合中的所有文档- 这将产生以下输出- 以下是使用MongoDB

  • 我有一个tome服务器,从Android,我可以调用GET方法,效果很好。现在我尝试使用排球库发布一个实体,其中包含一个字段java.util.Date,但在服务器中我得到: 我试图覆盖johnzon转换器,如下所示: 在resources.xml中: 在开放jb-jar中.xml 在pojo部署中,我给出了一个类似“test”的随机名称 然后在我的实体中: 我从这里发现了这个配置 但问题仍然存在

  • Apache Johnzon 是用于解析和创建 JSONP 的 Java 库。它实现了 Json Processing JSON-P 1.0 和即将到来的 Json Binding JSON-B 1.0 规范。 Johnzon 还提供了一个自己的 Mapper API,它提供扩展功能,流 API 和 JAX-RS 集成模块。 Johnzon 用于 Apache TomEE JavaEE 服务器和

  • JohnCMS 是款免费开源的手机网站内容管理系统(WAP 引擎),支持3G彩版,web版需要插件。提供插件实现WEB可用语言:阿塞拜疆语,中文,德语,英语,印尼,Latviešu,ROMANA,俄罗斯,Toiki,乌克兰,O`zbekcha,越南语等。 环境:php/MySQL 安装后台:http://网址/install/

  • 约翰魔法师 (John the sorcerer)是一个基于西蒙巫师的冒险游戏。它不使用scummvm。图形是许可的。它包括一个库存系统和一些RPG元素。

相关阅读

相关文章

相关问答

相关文档