Categories
MNS- Code

John The Ripper A Top Secret Password Cracking Tool

John the Ripper is a popular open-source password cracking tool used by penetration testers, ethical hackers, and security professionals.

  Home Page  John The Ripper 


John The Ripper

 Read This Post In Hindi.. 

What is John the Ripper?

John the Ripper is a popular open-source password cracking tool used by penetration testers, ethical hackers, and security professionals. It is designed to identify weak passwords using various attack techniques such as brute force, dictionary attacks, and hybrid attacks.

It supports a wide variety of hash types, including:

Unix/Linux password hashes (e.g., MD5, SHA-1)

Windows LM/NTLM hashes

Encrypted private keys, compressed files, and more.

How to Install John the Ripper in Termux

Update and upgrade packages Open Termux and run:

pkg update

pkg upgrade

Install essential dependencies

pkg install git build-essential python

Clone the repository Clone the latest John the Ripper source code from GitHub:

git clone https://github.com/openwall/john.git

Go to the source directory

cd john/src

Build John the Ripper Compile the source code by running:

./configure && make -s clean && make -sj4

Run John the Ripper Go to the run directory:

cd ../run ./john –help

Now you can use John the Ripper to crack the hashes.

How to Use John the Ripper

Create or Obtain a Hash File Place the password hash(s) you want to crack into a text file (e.g., hash.txt).

Basic usage Run the tool on a hash file:

./john hash.txt

Using a wordlist If you have a wordlist (for example, rockyou.txt), you can use:

./john –wordlist=rockyou.txt hash.txt

Show cracked passwords To view the cracked passwords:

./john –show hash.txt

Benchmark performance Test the performance of John the Ripper:

./john –test

Specifying the hash type If you know the type of hash (for example, SHA-256), specify it with –format:

./john –format=raw-sha256 hash.txt

General features of John the Ripper

Multi-threading: Takes advantage of multiple CPU cores for faster cracking.

Hash Detection: Automatically identifies the hash type (or specify it manually).

Attack Modes

Single Crack Mode: Targets weak passwords (default mode).

Dictionary Attack: Uses a wordlist to guess the password.

Incremental Mode: Performs brute force cracking.

External Mode: Allows custom cracking rules.

Example: Cracking an MD5 Hash

Create a Test Hash Save the following MD5 hash to a file named md5hash.txt:

$1$abcdef12$KFBG3q1iNs9.AIsNyr6xB/

Run John the Ripper

./john md5hash.txt

Result After successful cracking, run:

./john –show md5hash.txt

Output:

$1$abcdef12$KFBG3q1iNs9.AIsNyr6xB/ -> password123

Additional tips

Use a large wordlist like rockyou.txt for dictionary attacks. You can download it in Termux:

wget https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt

If the wordlist fails, use –incremental for brute force cracking:

./john –incremental hash.txt

If you need further help with specific configurations or attacks, let me know!


 Read This Post In Hindi.. 
 Go Home 


Discover more from MNS.Code.Blog

Subscribe to get the latest posts sent to your email.

Leave Your Feeling