John is a Linux password cracking tool that can crack the shadow password of a Linux system.
Official station: http://www.openwall.com/john/
Installation and use:
1 2 3 4 5 6 7 # wget http://www.openwall.com/john/j/john-1.8.0.tar.gz # tar xf john-1.8.0.tar.gz # cd john-1.8.0/src # make generic # Here you can view Redme, find the appropriate command to compile # cd .. /run # cp/etc/passwd/etc/shadow.
First, unshardow is required.
1 #./unshadow passwd shadow> mypasswd
Then officially start cracking
1 2 3 4 5 6 7 8 9 10 11 12 13 #. /john mypasswd Loaded 1 password hash (bcrypt [Blowfish 32/64 X2]) Press 'q' or Ctrl-C to abort, almost any other key for status 0g 0: 00: 00: 24 9% 2/3 0 g/s 614.5 p/s 614.5c/s 614.5C/s Loser1 .. lovers1 0g 0: 00: 01: 42 37% 2/3 0 g/s 616.1 p/s 616.1c/s 616.1C/s andromeda ?.. Angels? 0g 0: 00: 02: 40 63% 2/3 0 g/s 616.2 p/s 616.2c/s 616.2C/s lissabon9 .. mart9 0g 0: 00: 04: 58 3/3 0 g/s 615.8 p/s 615.8c/s 615.8C/s apech .. sarco 0g 0: 00: 05: 08 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s 190574 .. 190684 0g 0: 00: 05: 10 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s manne1 .. mannot 0g 0: 00: 05: 13 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s anitoo .. animay 0g 0: 00: 05: 58 3/3 0 g/s 615.7 p/s 615.7c/s 615.7C/s 190530 .. 190536 0g 0: 00: 07: 06 3/3 0 g/s 615.8 p/s 615.8c/s 615.8C/s johira .. johirl 0g 0: 00: 07: 19 3/3 0 g/s 615.9 p/s 615.9c/s 615.9C/s jhanch .. jhancy
During the cracking process, you can press the key other than q to view the cracking process. The cracking result will be included in john. pot.
If the cracking process is interrupted, use the following command to resume the session and continue the cracking.
1 # john -- restore
Common options include
1 2 account opening 10 processes, save the session name myname to crack mypasswd #./john -- session = myname -- for = 10 mypasswd
The advantage of saving the session is that the session can be interrupted. After the session is interrupted, you can use-restore = myname to continue cracking.
You can also use-format to specify the format of the password file. For more information, see the following help information.
John's Command help
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 21 22 23 24 25 26 John the Ripper password cracker, version 1.8.0 Copyright (c) 1996-2013 by Solar Designer Homepage: http://www.openwall.com/john/ Usage: john [OPTIONS] [PASSWORD-FILES] -- single "single crack" mode # simple cracking mode -- wordlist = FILE -- stdin wordlist mode, read words from FILE or stdin # dictionary cracking mode -- rules enable word mangling rules for wordlist MODE -- incremental [= mode] "incremental" MODE [using section mode] # Add cracking MODE -- external = MODE external mode or word filter -- stdout [= LENGTH] just output candidate passwords [cut at LENGTH] -- restore [= NAME] restore an interrupted session [called NAME] -- session = NAME give a new session the NAME -- status [= NAME] print status of a session [called NAME] -- make-charset = FILE make a charset, FILE will be overwritten -- show cracked passwords -- test [= TIME] run tests and benchmarks for TIME seconds each -- users = [-] LOGIN | UID [,...] [do not] load this (these) user (s) only -- groups = [-] GID [,...] load users [not] of this (these) group (s) only -- shells = [-] SHELL [,...] load users with [out] this (these) shell (s) only -- salts = [-] N load salts with [out] at least N passwords only -- save-memory = LEVEL enable memory saving, at LEVEL 1 .. 3 -- node = MIN [-MAX]/TOTAL this node's number range out of TOTAL count -- fork = N fork N processes -- format = NAME force hash type NAME: descrypt/bsdicrypt/md5crypt/bcrypt/LM/AFS/tripcode/dummy