maemo.org - Talk

maemo.org - Talk (https://talk.maemo.org/index.php)
-   Applications (https://talk.maemo.org/forumdisplay.php?f=41)
-   -   [ANNOUNCE] John the Ripper (latest) ... (https://talk.maemo.org/showthread.php?t=88076)

colin.stephane 2012-11-30 14:31

[ANNOUNCE] John the Ripper (latest) ...
 
Hi all,

As requested by peterleinchen here is my first attempt to package the latest community-enhanced version of John The Ripper utility :

John The Ripper :

Active password cracking tool.

Overview :

John the Ripper is a tool designed to help systems administrators to find weak (easy to guess or crack through brute force) passwords, and even automatically mail users warning them about it, if it is desired.

Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

Homepage :

http://www.openwall.com/john/

Download packages from extra-devel :

Activate all repositories following this tutorial : Repositories Activation

Then, as usual, as root, install with :

Code:

-bash-2.05b# apt-get install john && john --help
Reading package lists... Done
Building dependency tree     
Reading state information... Done
Suggested packages:
  wordlist
The following NEW packages will be installed:
  john
0 upgraded, 1 newly installed, 0 to remove and 19 not upgraded.
Need to get 0B/1198kB of archives.
After this operation, 2363kB of additional disk space will be used.
Selecting previously deselected package john.
(Reading database ... 47501 files and directories currently installed.)
Unpacking john (from .../john_1.7.9-jumbo-7-1maemo0_armel.deb) ...
Setting up john (1.7.9-jumbo-7-1maemo0) ...
John the Ripper password cracker, ver: 1.7.9-jumbo-7 [generic]
Copyright (c) 1996-2012 by Solar Designer and others
Homepage: http://www.openwall.com/john/

Usage: john [OPTIONS] [PASSWORD-FILES]
--config=FILE            use FILE instead of john.conf or john.ini
--single[=SECTION]        "single crack" mode
--wordlist[=FILE] --stdin wordlist mode, read words from FILE or stdin
                  --pipe  like --stdin, but bulk reads, and allows rules
--loopback[=FILE]        like --wordlist, but fetch words from a .pot file
--dupe-suppression        suppress all dupes in wordlist (and force preload)
--encoding=NAME          input data is non-ascii (eg. UTF-8, ISO-8859-1).
                          For a full list of NAME use --list=encodings
--rules[=SECTION]        enable word mangling rules for wordlist modes
--incremental[=MODE]      "incremental" mode [using section MODE]
--markov[=OPTIONS]        "Markov" mode (see doc/MARKOV)
--external=MODE          external mode or word filter
--stdout[=LENGTH]        just output candidate passwords [cut at LENGTH]
--restore[=NAME]          restore an interrupted session [called NAME]
--session=NAME            give a new session the NAME
--status[=NAME]          print status of a session [called NAME]
--make-charset=FILE      make a charset file. It will be overwritten
--show[=LEFT]            show cracked passwords [if =LEFT, then uncracked]
--test[=TIME]            run tests and benchmarks for TIME seconds each
--users=[-]LOGIN|UID[,..] [do not] load this (these) user(s) only
--groups=[-]GID[,..]      load users [not] of this (these) group(s) only
--shells=[-]SHELL[,..]    load users with[out] this (these) shell(s) only
--salts=[-]COUNT[:MAX]    load salts with[out] COUNT [to MAX] hashes
--pot=NAME                pot file to use
--format=NAME            force hash type NAME: afs bf bfegg bsdi crc32 des dmd5 dominosec dragonfly3-32 dragonfly3-64 dragonfly4-32 dragonfly4-64 drupal7 dummy dynamic_n epi episerver gost hdaa hmac-md5 hmac-sha1 hmac-sha224 hmac-sha256 hmac-sha384 hmac-sha512 hmailserver ipb2 keepass keychain krb4 krb5 lm lotus5 md4-gen md5 md5ns mediawiki mscash mscash2 mschapv2 mskrb5 mssql mssql05 mysql mysql-sha1 nethalflm netlm netlmv2 netntlm netntlmv2 nsldap nt nt2 odf office oracle oracle11 osc pdf phpass phps pix-md5 pkzip po pwsafe racf rar raw-md4 raw-md5 raw-md5u raw-sha raw-sha1 raw-sha1-linkedin raw-sha224 raw-sha256 raw-sha384 raw-sha512 salted-sha1 sapb sapg sha1-gen sha256crypt sha512crypt sip ssh sybasease trip vnc wbb3 wpapsk xsha xsha512 zip
--list=WHAT              list capabilities, see --list=help or doc/OPTIONS
--save-memory=LEVEL      enable memory saving, at LEVEL 1..3
--mem-file-size=SIZE      size threshold for wordlist preload (default 5 MB)
--nolog                  disables creation and writing to john.log file
--crack-status            emit a status line whenever a password is cracked
--max-run-time=N          gracefully exit after this many seconds
--regen-lost-salts=N      regenerate lost salts (see doc/OPTIONS)
-bash-2.05b#

After successful installation, just use it !!!


Hope you like it :) ...

A++

peterleinchen 2012-11-30 14:58

Re: [ANNOUNCE] John the Ripper (latest) ...
 
O well,
I do feel honored to be mentioned in OP. :D (especially as I did not do anything)
Just asked politely for an update, not requesting ;)
But it is nice to have an own JTR related thread now.

Merci beaucoup

--edit
confirming the working of newer version, recognizing of hash types and jumbo pack

colin.stephane 2012-11-30 15:48

Re: [ANNOUNCE] John the Ripper (latest) ...
 
Quote:

Originally Posted by peterleinchen (Post 1300057)
O well,
I do feel honored to be mentioned in OP. :D (especially as I did not do anything)
Just asked politely for an update, not requesting ;)
But it is nice to have an own JTR related thread now.

Merci beaucoup

--edit
confirming the working of newer version, recognizing of hash types and jumbo pack

No problem,

Welcome to the open-source world ... :D

A++

sunyakram 2012-11-30 18:55

Re: [ANNOUNCE] John the Ripper (latest) ...
 
thank you colin.stephane.but tutorial for use?bcz am using it 1st time

tonypower88 2012-11-30 19:12

Re: [ANNOUNCE] John the Ripper (latest) ...
 
thanks a lot

jtr is a great tool, but n900 computing power is poor to crack hashes it takes a long time

www.rzr.online.fr 2012-11-30 19:26

Re: [ANNOUNCE] John the Ripper (latest) ...
 
for harmattan users you can install it in shared repo too ...

colin.stephane 2012-11-30 19:44

Re: [ANNOUNCE] John the Ripper (latest) ...
 
Quote:

Originally Posted by sunyakram (Post 1300115)
thank you colin.stephane.but tutorial for use?bcz am using it 1st time

Have look here : John The Ripper

A++

StefanL 2012-11-30 19:58

Re: [ANNOUNCE] John the Ripper (latest) ...
 
Quote:

Originally Posted by sunyakram (Post 1300115)
thank you colin.stephane.but tutorial for use?bcz am using it 1st time

Dude, did you even read the first post? Go to the website, plenty of info to be found on there.

Quote:

Originally Posted by colin.stephane (Post 1300053)

If you are interested in a working example application, check out implementation in faircrack (follow my signature). If everything else fails, google is still your friend. Devs usually don't appreciate "lazy" people, but are more than willing to help out people who have shown some basic initiative ;) (see the above minimum basic initiative requirements). :P

MeeNu 2012-11-30 21:56

Re: [ANNOUNCE] John the Ripper (latest) ...
 
Thanks for this great app!
But......i shall be boycotting it ;)

Rabah_vip 2012-12-02 18:12

Re: [ANNOUNCE] John the Ripper (latest) ...
 
sorry but i don't know how to install it on nokia n9 please someone can help me with ?


All times are GMT. The time now is 00:53.

vBulletin® Version 3.8.8