- John the Ripper
Infobox Software
name = John the Ripper
Jack, John the Ripper's mascot.
caption =
author =
developer = Alexander Peslyak (Solar Designer)
released =
latest release version = 1.7.0.2
latest release date = release date|2006|03|23
latest preview version = 1.7.3.1
latest preview date = release date|2008|07|18
operating system =Cross-platform
genre =Password cracking
license =GNU General Public License
website = http://www.openwall.com/john/John the Ripper is a free
password cracking software tool. Initially developed for the UNIXoperating system , it currently runs on fifteen different platforms (11 architecture-specific flavors of Unix,DOS , Win32,BeOS , andOpenVMS ). It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES,MD5 , or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003LM hash . Additional modules have extended its ability to includeMD4 -based password hashes and passwords stored in LDAP,MySQL and others.Sample output
Here is a sample output in a
Debian GNU/Linux environment.root@0 [john-1.6.37] # cat pass.txt user:AZl.zWwxIh15Q root@0 [john-1.6.37] # john -w:password.lst pass.txt Loaded 1 password hash (Traditional DES [24/32 4K] ) example (user) guesses: 1 time: 0:00:00:00 100% c/s: 752 trying: 12345 - pookie
Attack types
One of the modes John can use is the
dictionary attack . It takes text string samples (usually from a file, called a "wordlist", containing words found in adictionary ), encrypting it in the same format as the password being examined (including both the encryption algorithm and key), and comparing the output to the encrypted string. It can also perform a variety of alterations to the dictionary words and try these. Many of these alterations are also used in John's single attack mode, which modifies an associated plaintext (such as a username with an encrypted password) and checks the variations against the encrypted hashes.John also offers a brute force mode. In this type of attack, the program goes through all the possible plaintexts, hashing each one and comparing it to the input hash. John uses character frequency tables to try plaintexts containing more frequently-used characters first. This method is useful for cracking passwords which do not appear in dictionary wordlists, but it does take a long time to run.
See also
*
Openwall Project
*Password cracking
*Brute-force search
*Computer hacking
*Hacking tool External links
* [http://www.openwall.com/john/ Official page for John the Ripper]
* [http://www.banquise.net/misc/patch-john.html Unofficial John the Ripper patches]
* [http://ktulu.com.ar/en/djohn.php Distributed John (DJohn)] - distributed cracking over several machines
* [http://www.darknet.org.uk/2006/03/jtr-password-cracking-john-the-ripper-17-released-finally John the Ripper 1.7 Released]
* [http://marc.info/?l=john-users&m=114826308125791&w=2 John the Ripper 1.7.2 Released]
* [http://www.oiepoie.nl/2007/02/11/high-speed-password-cracking-with-john-the-ripper/ Running John on dual core or multi CPU machines]
Wikimedia Foundation. 2010.