top of page
aldern00b

Cracking Hashes with John The Ripper

Installation


Clone this repository to get it installed:

git clone <https://github.com/openwall/john> -b bleeding-jumbo john 

Then

cd john/src/ 

to change your current directory to where the source code is.

Once you're in this directory, use

./configure

to check the required dependencies and options that have been configured.

If you're happy with this output, and have installed any required dependencies that are needed, use

make -s clean && make -sj4 

to build a binary of john. This binary will be in the above run directory, which you can change to with

cd ../run

You can test this binary using

./john --test

Important to note here is you HAVE to use

./john

you can’t just call john. If you do, you may be picking up the default john installed on the system, which doesn’t offer the same availability of hash types.

./john [options] [path to file]

Cracking

Use Hash ID to find the type of hash then run John like this

./john --format=[format] --wordlist=[path to wordlist] [path to file]

-format= - This is the flag to tell John that you're giving it a hash of a specific format (found from HashID), and to use the following format to crack it then [format] - The format that the hash is in.


Example:

./john --format=raw-md5 --wordlist=/usr/share/wordlists/rockyou.txt ****hash_to_crack.txt

To find the right format you can search for the hash type that hashid found for you by doing this

./john —list=formats | grep “[format]”

22 views0 comments

Recent Posts

See All

Comments


bottom of page