John the Ripper password cracker.
John the Ripper is a fast password cracker, currently available for
many flavors of Unix (11 are officially supported, not counting
different architectures), Windows, DOS, BeOS, and OpenVMS (the latter
requires a contributed patch). Its primary purpose is to detect weak
Unix passwords. Besides several crypt(3) password hash types most
commonly found on various Unix flavors, supported out of the box are
Kerberos/AFS and Windows LM hashes, as well as DES-based tripcodes, plus
many more hashes and ciphers in "community enhanced" -jumbo versions
and/or with other contributed patches.
How to install.
See INSTALL for information on installing John on your system.
How to use.
To run John, you need to supply it with some password files and
optionally specify a cracking mode, like this, using the default order
of modes and assuming that "passwd" is a copy of your password file:
john passwd
or, to restrict it to the wordlist mode only, but permitting the use
of word mangling rules:
john --wordlist=password.lst --rules passwd
Cracked passwords will be printed to the terminal and saved in the
file called $JOHN/john.pot (in the documentation and in the
configuration file for John, "$JOHN" refers to John's "home
directory"; which directory it really is depends on how you installed
John). The $JOHN/john.pot file is also used to not load password
hashes that you already cracked when you run John the next time.
To retrieve the cracked passwords, run:
john --show passwd
While cracking, you can press any key for status, or 'q' or Ctrl-C to
abort the session saving its state to a file ($JOHN/john.rec by
default). If you press Ctrl-C for a second time before John had a
chance to complete handling of your first Ctrl-C, John will abort
immediately without saving. By default, the state is also saved every
10 minutes to permit for recovery in case of a crash.
To continue an interrupted session, run:
john --restore
These are just the most essential things you can do with John. For
a complete list of command line options and for more complicated usage
examples you should refer to OPTIONS and EXAMPLES, respectively.
Please note that "binary" (pre-compiled) distributions of John may
include alternate executables instead of just "john". You may need to
choose the executable that fits your system best, e.g. "john-omp" to
take advantage of multiple CPUs and/or CPU cores.
Features and performance.
John the Ripper is designed to be both feature-rich and fast. It
combines several cracking modes in one program and is fully
configurable for your particular needs (you can even define a custom
cracking mode using the built-in compiler supporting a subset of C).
Also, John is available for several different platforms which enables
you to use the same cracker everywhere (you can even continue a
cracking session which you started on another platform).
Out of the box, John supports (and autodetects) the following Unix
crypt(3) hash types: traditional DES-based, "bigcrypt", BSDI extended
DES-based, FreeBSD MD5-based (also used on Linux and in Cisco IOS), and
OpenBSD Blowfish-based (now also used on some Linux distributions and
supported by recent versions of Solaris). Also supported out of the box
are Kerberos/AFS and Windows LM (DES-based) hashes, as well as DES-based
tripcodes.
When running on Linux distributions with glibc 2.7+, John 1.7.6+
additionally supports (and autodetects) SHA-crypt hashes (which are
actually used by recent versions of Fedora and Ubuntu), with optional
OpenMP parallelization (requires GCC 4.2+, needs to be explicitly
enabled at compile-time by uncommenting the proper OMPFLAGS line near
the beginning of the Makefile).
Similarly, when running on recent versions of Solaris, John 1.7.6+
supports and autodetects SHA-crypt and SunMD5 hashes, also with
optional OpenMP parallelization (requires GCC 4.2+ or recent Sun Studio,
needs to be explicitly enabled at compile-time by uncommenting the
proper OMPFLAGS line near the beginning of the Makefile and at runtime
by setting the OMP_NUM_THREADS environment variable to the desired
number of threads).
John the Ripper Pro adds support for Windows NTLM (MD4-based) and Mac
OS X 10.4+ salted SHA-1 hashes.
"Community enhanced" -jumbo versions add support for many more password
hash types, including Windows NTLM (MD4-based), Mac OS X 10.4-10.6
salted SHA-1 hashes, Mac OS X 10.7 salted SHA-512 hashes, raw MD5 and
SHA-1, arbitrary MD5-based "web application" password hash types, hashes
used by SQL database servers (MySQL, MS SQL, Oracle) and by some LDAP
servers, several hash types used on OpenVMS, password hashes of the
Eggdrop IRC bot, and lots of other hash types, as well as many
non-hashes such as OpenSSH private keys, S/Key skeykeys files, Kerberos
TGTs, PDF files, ZIP (classic PKZIP and WinZip/AES) and RAR archives.
Unlike older crackers, John normally does not use a crypt(3)-style
routine. Instead, it has its own highly optimized modules for different
hash types and processor architectures. Some of the algorithms used,
such as bitslice DES, couldn't have been implemented within the crypt(3)
API; they require a more powerful interface such as the one used in
John. Additionally, there are assembly language routines for several
processor architectures, most importantly for x86-64 and x86 with SSE2.
Graphical User Interface (GUI).
There is an official GUI for John the Ripper: Johnny.
Despite the fact that Johnny is oriented onto core john, all basic
functionality is supposed to work in all versions, even Jumbo. So,
password could be loaded from file and cracked with different
options.
Johnny is a separate program, therefore, you need to have John the
Ripper installed in order to use it.
You could find more info about releases and Johnny on the wiki:
http://openwall.info/wiki/john/johnny
Documentation.
The rest of documentation is located in separate files, listed here in
the recommended order of reading:
* INSTALL - installation instructions
* OPTIONS - command line options and additional utilities
* MODES - cracking modes: what they are
* CONFIG (*) - how to customize
* RULES (*) - wordlist rules syntax
* EXTERNAL (*) - defining an external mode
* EXAMPLES - usage examples - strongly recommended
* FAQ - guess
* CHANGES (*) - history of changes
* CONTACT (*) - how to contact the author or otherwise obtain support
* CREDITS (*) - credits
* LICENSE - copyrights and licensing terms
* COPYING - GNU GPL version 2, as referenced by LICENSE above
(*) most users can safely skip these.
Happy reading!
$Owl: Owl/packages/john/john/doc/README,v 1.25 2013/05/30 00:22:14 solar Exp $
没有合适的资源?快使用搜索试试~ 我知道了~
john Linux密码暴力破解Win版本
共193个文件
txt:68个
py:35个
exe:31个
5星 · 超过95%的资源 需积分: 49 32 下载量 28 浏览量
2018-01-11
01:19:00
上传
评论 1
收藏 31.52MB RAR 举报
温馨提示
John the Ripper是一款免费、开源的暴力密码破解器,它有多平台版本,支持目前大多数的加密算法,如DES、MD4、MD5等。这款工具就像它的名字一样,更为直接且崇尚蛮力,其破解过程完全取决于用户,即只要给它时间,它总会给你一个好的结果。
资源推荐
资源详情
资源评论
收起资源包目录
john Linux密码暴力破解Win版本 (193个子文件)
john.bash_completion 29KB
benchmark-unify 9KB
utf8.chr 8.86MB
latin1.chr 7.1MB
ascii.chr 5.46MB
alnumspace.chr 3.98MB
alnum.chr 3.9MB
lowernum.chr 2.35MB
alpha.chr 1.86MB
lanman.chr 1.4MB
uppernum.chr 1.16MB
lowerspace.chr 1.15MB
lm_ascii.chr 1.13MB
lower.chr 1.11MB
upper.chr 653KB
digits.chr 454KB
john.conf 83KB
repeats32.conf 72KB
dumb32.conf 57KB
repeats16.conf 54KB
dumb16.conf 42KB
dynamic.conf 39KB
korelogic.conf 23KB
dynamic_flat_sse_formats.conf 10KB
regex_alphabets.conf 5KB
john.local.conf 4KB
cygwin1.dll 2.54MB
cygcrypto-0.9.8.dll 1.12MB
cygssl-0.9.8.dll 263KB
cyggcc_s-1.dll 79KB
cygz.dll 76KB
cyggomp-1.dll 42KB
cygcrypt-0.dll 7KB
john.exe 10.09MB
genmkvpwd.exe 99KB
cprepair.exe 81KB
uaf2john.exe 72KB
wpapcap2john.exe 57KB
luks2john.exe 50KB
tgtsnarf.exe 37KB
raw2dyna.exe 34KB
calc_stat.exe 34KB
mkvcalcproba.exe 32KB
gpg2john.exe 6KB
keyring2john.exe 6KB
keepass2john.exe 6KB
unique.exe 6KB
hccap2john.exe 6KB
ssh2john.exe 6KB
keychain2john.exe 6KB
base64conv.exe 6KB
kwallet2john.exe 6KB
truecrypt_volume2john.exe 6KB
rar2john.exe 6KB
putty2john.exe 6KB
unshadow.exe 6KB
undrop.exe 6KB
racf2john.exe 6KB
pwsafe2john.exe 6KB
pfx2john.exe 6KB
keystore2john.exe 6KB
unafs.exe 6KB
dmg2john.exe 6KB
zip2john.exe 6KB
john.log 399KB
password.lst 29KB
mailer 1KB
makechr 842B
pass_gen.pl 150KB
rexgen2rules.pl 16KB
netntlm.pl 9KB
sap2john.pl 9KB
radius2john.pl 7KB
cisco2john.pl 6KB
leet.pl 3KB
ios7tojohn.pl 2KB
lion2john.pl 979B
aix2john.pl 867B
lion2john-alt.pl 860B
sha-dump.pl 526B
sha-test.pl 491B
ldif2john.pl 453B
hextoraw.pl 410B
john.pot 0B
office2john.py 83KB
efs2john.py 40KB
pcap2john.py 34KB
7z2john.py 32KB
bitcoin2john.py 32KB
ml2john.py 27KB
sshng2john.py 27KB
pdf2john.py 13KB
1password2john.py 8KB
androidfde2john.py 7KB
odf2john.py 5KB
netscreen.py 5KB
dmg2john.py 5KB
keystore2john.py 4KB
sxc2john.py 3KB
kwallet2john.py 3KB
共 193 条
- 1
- 2
资源评论
- XU美伢2023-07-26使用这个文件可以帮助用户更好地了解如何使用密码破解工具。
- KerstinTongxi2023-07-26这个文件提供了一个可行的方法来解决Linux密码的问题。
- 三山卡夫卡2023-07-26虽然使用该文件需要一定的技术基础,但是对于想要提升密码破解技能的用户来说是一个不错的指南。
- 曹将2023-07-26这个文件的作者对密码暴力破解有着深入的研究,可以说是颇为专业。
- 石悦2023-07-26文件内容详实,解释了如何在Windows操作系统中运行该工具。
「已注销」
- 粉丝: 104
- 资源: 3
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 基于python开发的口红色号识别程序+源码+开发文档+源码解析(毕业设计&课程设计&项目开发)
- TP-LINK TL-WN725N V3 Linux 驱动
- 020ssm-jsp-mysql班级同学录网站.zip(可运行源码+数据库文件+文档)
- 什么是stm32f103rct6,有哪些优缺点?
- 李明哲尚能2.zip
- 019ssm-jsp-mysql奥迪维修保养服务管理系统.zip(可运行源码+数据库文件+)
- AB测试数据-增设中小店铺广告位
- YOLOv8红外场景的车辆-行人-斑马线-交通灯检测+数据集+pyqt界面
- 基于JSP毕业设计-OA办公自动化系统-毕业设计.zip
- 基于JSP毕业设计-MVC设计模式应用之游戏卡在线销售系统(论文).zip
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功