Home Page John The Ripper
John The Ripper
What is John the Ripper?
John the Ripper is a popular open-source password cracking tool used by penetration testers, ethical hackers, and security professionals. It is designed to identify weak passwords using various attack techniques such as brute force, dictionary attacks, and hybrid attacks.
It supports a wide variety of hash types, including:
Unix/Linux password hashes (e.g., MD5, SHA-1)
Windows LM/NTLM hashes
Encrypted private keys, compressed files, and more.
How to Install John the Ripper in Termux
Update and upgrade packages Open Termux and run:
pkg update
pkg upgrade
Install essential dependencies
pkg install git build-essential python
Clone the repository Clone the latest John the Ripper source code from GitHub:
git clone https://github.com/openwall/john.git
Go to the source directory
cd john/src
Build John the Ripper Compile the source code by running:
./configure && make -s clean && make -sj4
Run John the Ripper Go to the run directory:
cd ../run ./john –help
Now you can use John the Ripper to crack the hashes.
How to Use John the Ripper
Create or Obtain a Hash File Place the password hash(s) you want to crack into a text file (e.g., hash.txt).
Basic usage Run the tool on a hash file:
./john hash.txt
Using a wordlist If you have a wordlist (for example, rockyou.txt), you can use:
./john –wordlist=rockyou.txt hash.txt
Show cracked passwords To view the cracked passwords:
./john –show hash.txt
Benchmark performance Test the performance of John the Ripper:
./john –test
Specifying the hash type If you know the type of hash (for example, SHA-256), specify it with –format:
./john –format=raw-sha256 hash.txt
General features of John the Ripper
Multi-threading: Takes advantage of multiple CPU cores for faster cracking.
Hash Detection: Automatically identifies the hash type (or specify it manually).
Attack Modes
Single Crack Mode: Targets weak passwords (default mode).
Dictionary Attack: Uses a wordlist to guess the password.
Incremental Mode: Performs brute force cracking.
External Mode: Allows custom cracking rules.
Example: Cracking an MD5 Hash
Create a Test Hash Save the following MD5 hash to a file named md5hash.txt:
$1$abcdef12$KFBG3q1iNs9.AIsNyr6xB/
Run John the Ripper
./john md5hash.txt
Result After successful cracking, run:
./john –show md5hash.txt
Output:
$1$abcdef12$KFBG3q1iNs9.AIsNyr6xB/ -> password123
Additional tips
Use a large wordlist like rockyou.txt for dictionary attacks. You can download it in Termux:
wget https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt
If the wordlist fails, use –incremental for brute force cracking:
./john –incremental hash.txt
If you need further help with specific configurations or attacks, let me know!
Read This Post In Hindi..
Go Home
Discover more from MNS.Code.Blog
Subscribe to get the latest posts sent to your email.
