{"id":5223,"date":"2025-08-03T16:42:05","date_gmt":"2025-08-03T16:42:05","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=5223"},"modified":"2025-08-03T16:42:05","modified_gmt":"2025-08-03T16:42:05","slug":"use-the-john-the-ripper-password-cracker","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=5223","title":{"rendered":"use the John the Ripper password cracker"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"content-body\">&#13;<\/p>\n<section class=\"section main-article-chapter\" data-menu-title=\"What is John the Ripper?\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>What&#8217;s John the Ripper?<\/h2>\n<p>John the Ripper is an offline password cracking device that was <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.openwall.com\/lists\/john-users\/2015\/09\/10\/4\" target=\"_blank\" rel=\"noopener\">developed in 1996<\/a> by Openwall Undertaking. It&#8217;s notable for supporting a range of password codecs. This device permits safety practitioners to crack passwords, no matter encrypted or <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchdatamanagement\/definition\/hashing\">hashed<\/a> passwords, message authentication codes (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/message-authentication-code-MAC\">MACs<\/a>) and hash-based MACs (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/Hash-based-Message-Authentication-Code-HMAC\">HMACs<\/a>), or different artifacts of the authentication course of.<\/p>\n<figure class=\"main-article-image full-col\" data-img-fullsize=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure1-h.jpg\">\n  <img decoding=\"async\" src=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure1-h_mobile.jpg\" class=\"lazy\" srcset=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure1-h_mobile.jpg 960w,https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure1-h.jpg 1280w\" alt=\"Screenshot of the password formats John the Ripper supports\"\/><figcaption>\n   <i class=\"icon pictures\" data-icon=\"z\"\/>Determine 1. On the time of writing, John the Ripper helps this lengthy listing of password codecs.<br \/>\n  <\/figcaption><\/figure>\n<p>The device can be notable for its ubiquity and accessibility. It is included within the default repositories for a lot of Linux distributions, together with Debian and Ubuntu, and put in by default in most penetration testing distributions, together with Kali and BlackArch. A snap set up of it&#8217;s obtainable, together with a number of container choices in Docker Hub.<\/p>\n<p>Merely put, John cracks passwords. It makes an attempt to duplicate the password-handling performance of a goal storage mechanism in order that quite a few password values might be tried with out counting on password validation.<\/p>\n<p>Contemplate this easy instance: Take a system that shops passwords in hashed kind &#8212; which means, utilizing a cryptographic hash or message digest &#8212; as an alternative of storing the password worth. (<b>Observe:<\/b> <i>In an precise manufacturing context, this would not be prudent on account of safety issues related to this strategy, however we&#8217;re maintaining it easy for instance functions.<\/i>) On this situation, if you happen to obtained the password hash database, you would not know \u2013 but &#8212; customers&#8217; passwords. Probably the most easy option to discover out what the passwords are could be to hash many passwords utilizing the identical algorithm and examine them to the values saved within the database. Doing this requires you&#8217;ve the saved password listing or database, nevertheless it has the benefit that you do not have to aim logins in opposition to the system straight &#8212; you&#8217;ll be able to work offline at your leisure.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"How to use John the Ripper\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/> use John the Ripper<\/h2>\n<p>Earlier than utilizing John the Ripper, one necessary be aware: We&#8217;re utilizing VMs as an example utilization. Within the case of this device particularly, efficiency is necessary. Contemplate the relative benefits and downsides of utilizing virtualization and the context. For instance, you may discover an IaaS the place paying for CPU time might be an costly proposition. Otherwise you may get higher efficiency operating the device on a bunch OS quite than a visitor.<\/p>\n<p>That apart, John is easy to make use of. At a minimal, it&#8217;s essential to specify the saved password values you need to crack. Should you present no info aside from that, the device tries to determine what format the saved values are in and assumes a set of constraints about what you may need to do. That mentioned, usually, you must present extra info to permit the device to function most successfully.<\/p>\n<h3>Cracking modes<\/h3>\n<p>Contemplate which &#8220;cracking mode&#8221; you propose to make use of. You possibly can specify your individual <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.openwall.com\/john\/doc\/EXTERNAL.shtml\" target=\"_blank\" rel=\"noopener\">externally outlined modes<\/a>. John additionally has <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.openwall.com\/john\/doc\/MODES.shtml\" target=\"_blank\" rel=\"noopener\">built-in modes<\/a>:<\/p>\n<ul class=\"default-list\">\n<li><b>Single crack mode<\/b> makes use of details about the person, resembling username or full identify, from the provided password values, the place current, to aim to construct a brief, extremely targeted dictionary of focused passwords to crack.<\/li>\n<li><b>Wordlist mode<\/b> operates by way of a wordlist, both user-supplied or a built-in one, and tries all of the values within the wordlist.<\/li>\n<li><b>Incremental mode<\/b> makes an attempt to iterate by all attainable character mixtures based on adjustable size and complexity standards &#8212; for instance, all strings between 5 and eight alphanumeric characters.<\/li>\n<\/ul>\n<p>If you don&#8217;t specify a mode, the device tries them sequentially within the order listed above.<\/p>\n<h3>Password codecs<\/h3>\n<p>Whereas not mandatory in each case, it is useful to know the format passwords are saved in. It&#8217;s because functions may manipulate codecs in methods John may not anticipate &#8212; an online software, for instance, may Base64- or URL-encode values earlier than storing them. It is also useful as a result of the built-in mechanisms utilized by John to find out kind and format might be fallacious. Contemplate two similar-in-format however vastly completely different values: an MD5 hash and an MD5 keyed hash. The outputs are similar in format, however the processes that led to the outputs are something however. John would not know the distinction, until you present the lacking info.<\/p>\n<\/section>\n<section class=\"section main-article-chapter\" data-menu-title=\"Examples\">\n<h2 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"\/>Examples<\/h2>\n<p>Determine 2 illustrates utilizing the <span style=\"font-family: courier new, courier, monospace;\">unshadow<\/span> command. That is distributed with John the Ripper in most packages. It combines the contents of \/and many others\/passwd and \/and many others\/shadow on a Linux VM, on this case, Kali. Then, we used the <span style=\"font-family: courier new, courier, monospace;\">john<\/span> command and specified the format &#8212; on this case, the <span style=\"font-family: courier new, courier, monospace;\">crypt<\/span> mechanism. Since we have not informed it what cracking mode to make use of, John begins with single crack after which proceeds to wordlist &#8212; none was specified, so it used the default. Finally, it is going to transfer to incremental mode.<\/p>\n<figure class=\"main-article-image full-col\" data-img-fullsize=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure2-f.jpg\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure2-f_mobile.jpg\" class=\"lazy\" srcset=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure2-f_mobile.jpg 960w,https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure2-f.jpg 1280w\" alt=\"Screenshot of John the Ripper cracking passwords on Linux\" height=\"212\" width=\"559\"\/><figcaption>\n   <i class=\"icon pictures\" data-icon=\"z\"\/>Determine 2. Linux password cracking instance<br \/>\n  <\/figcaption><\/figure>\n<p>In a extra sophisticated instance, Determine 3 exhibits an try at cracking Microsoft Home windows passwords. As with the Linux instance, passwords should be put right into a format John the Ripper can perceive. To perform that, we used PwDump v8.2.<\/p>\n<figure class=\"main-article-image full-col\" data-img-fullsize=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure3-f.jpg\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure3-f_mobile.jpg\" class=\"lazy\" srcset=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure3-f_mobile.jpg 960w,https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure3-f.jpg 1280w\" alt=\"Screenshot of PwDump Microsoft password export\" height=\"182\" width=\"560\"\/><figcaption>\n   <i class=\"icon pictures\" data-icon=\"z\"\/>Determine 3. PwDump Microsoft password export<br \/>\n  <\/figcaption><\/figure>\n<p>These values are fed into John the Ripper to crack in Determine 4. We specified wordlist mode and instructed it to make use of rockyou.txt, one of many built-in wordlists that comes by default with most security-focused Linux distributions. Observe that you could be have to extract the textual content file first. The passwords had been set to weak values &#8212; dictionary phrases in all circumstances &#8212; to allow the cracking to finish shortly. These two examples display probably the most universally relevant and most simple utilization of John the Ripper. For extra superior utilization, you might have to get slightly artistic. Generally, the format of saved password values you&#8217;ll be able to get hold of should not in one of many codecs supported by John out of the field. With a number of intelligent modifications, nonetheless, you&#8217;ll be able to convert to a type of with some research.<\/p>\n<figure class=\"main-article-image full-col\" data-img-fullsize=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure4-f.jpg\">\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure4-f_mobile.jpg\" class=\"lazy\" srcset=\"https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure4-f_mobile.jpg 960w,https:\/\/www.techtarget.com\/rms\/onlineimages\/johntheripper-figure4-f.jpg 1280w\" alt=\"Screenshot of John the Ripper cracking Windows passwords\" height=\"155\" width=\"560\"\/><figcaption>\n   <i class=\"icon pictures\" data-icon=\"z\"\/>Determine 4. Cracking Home windows passwords<br \/>\n  <\/figcaption><\/figure>\n<p>On the finish of the day, John the Ripper is not probably the most sophisticated device, however as you may see with some experimentation, it&#8217;s a true workhorse for <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/Red-team-vs-blue-team-vs-purple-team-Whats-the-difference\">crimson teamers, blue teamers<\/a> and auditors alike.<\/p>\n<p><b>Editor&#8217;s be aware:<\/b> <i>It&#8217;s attainable to make use of John the Ripper &#8212; and any password cracker &#8212; lawfully and unlawfully. It&#8217;s as much as you to make sure your utilization is lawful. Get the suitable permission and approval earlier than making an attempt to crack passwords, and deal with the knowledge obtained ethically. If you&#8217;re not sure whether or not a given utilization is lawful, don&#8217;t proceed till you&#8217;ve confirmed that it&#8217;s &#8212; for instance, by discussing and validating your deliberate utilization together with your group&#8217;s counsel.<\/i><\/p>\n<div class=\"btt-thumbnailContainer\">\n  <span class=\"btt-thumbnailTitle\"> use John the Ripper to crack passwords<\/span><br \/>\n  <a rel=\"nofollow\" target=\"_blank\" class=\"btt-thumbnailLink\" data-video-id=\"580199\" data-channel-id=\"18865\"><\/p>\n<div class=\"btt-thumbnailImgContainer\">\n    <img decoding=\"async\" class=\"btt-videoBtThumbnail\" src=\"https:\/\/cdn.brighttalk.com\/ams\/california\/images\/communication\/580199\/image_912614.jpg?width=640&amp;height=360\"\/>\n   <\/div>\n<p><\/a><br \/>\n  <time class=\"btt-video-duration\" datetime=\"PT13M21S\">13:21<\/time>\n <\/div>\n<\/section>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>&#13; What&#8217;s John the Ripper? John the Ripper is an offline password cracking device that was developed in 1996 by Openwall Undertaking. It&#8217;s notable for supporting a range of password codecs. This device permits safety practitioners to crack passwords, no matter encrypted or hashed passwords, message authentication codes (MACs) and hash-based MACs (HMACs), or different [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5225,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[4461,2262,1631,4460],"class_list":["post-5223","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cracker","tag-john","tag-password","tag-ripper"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5223"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5223\/revisions"}],"predecessor-version":[{"id":5224,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/5223\/revisions\/5224"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/5225"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-13 14:58:14 UTC -->