Using John The Ripper To Crack Password Hashes

When To Use John The Ripper

How to Download John The Ripper

locate john

Getting Started

./john passwordFile

John’s Cracking Modes

Wordlist Mode

./john --wordlist=/usr/share/wordlists/rockyou.txt passwordFile

Single Crack Mode

unshadow /etc/passwd /etc/shadow > passwordFile
./john --single passwordFile

Incremental Mode

File = $JOHN/alpha.chr
MinLen = 1
MaxLen = 13
CharCount = 52
./john --incremental=Digits passwordFile

Hash Formats

./john --format=Raw-MD5 passwordFile
./john --list=formats




A cybersecurity enthusiast, and founder @

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Penetration Testing Vs Vulnerability Scanning

A Practical Path from EDR to XDR — How to Do It?

Keeping Safe OnLine — Introduction

A Major difference between Web 2.0 and Web 3.0

Stark Truth & the Dark Web

What is a VPN?

“Insuredao a Insurance Token “

ATTA Video Streaming Benefits

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
A. Boukar

A. Boukar

A cybersecurity enthusiast, and founder @

More from Medium

Photo Expedition Script Retro

Four Simple Ways To Center a Div With CSS

Ubuntu 訓練 faster-rcnn

Compiling GeckoEngine For ARM