John the Ripper
Basic Usage
# Basic usage with automatic format detection
john hash.txt
# Specify a format
john --format=raw-md5 hash.txt
# Use wordlist
john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt
# Show cracked passwords
john --show hash.txtExtracting Hashes
Shadow File (Linux)
# First, combine /etc/passwd and /etc/shadow
unshadow /etc/passwd /etc/shadow > hashes.txt
# Then crack with John
john hashes.txtWindows NTLM Hashes
Zip Files
RAR Files
PDF Files
SSH Keys
Attack Modes
Dictionary Attack
Incremental Mode (Brute Force)
Rules-Based Attack
Common Hash Formats
Advanced Options
Custom Rules
Integration in Pentesting Workflow
Tips for Effective Usage
Real-World Example: Cracking Linux Passwords
Additional Resources
Last updated