Sponsored Content
Special Forums UNIX and Linux Applications John the Ripper application question Post 302378979 by dday on Wednesday 9th of December 2009 08:54:45 AM
Old 12-09-2009
I have never used this application, but just reading the docs tells me that the answer is no. This is a password cracker that uses brute force to decrypt a password from a file, eg the passwd file in unix. It doesn't break or recover a password used to encrypt a file itself.
 

3 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

sudo: application install question

I need to install an application on my Sun station and need root privleges to do so. I was given sudo privileges and was told to issue the following command. bash-2.03$ sudo init 0 I've read the man pages for init and understand the purpose of that command. My questions are: 1. From the... (2 Replies)
Discussion started by: forbin24
2 Replies

2. Red Hat

John the Ripper / CRACK

Has anyone used JTR or CRACK to check if you have any weak passwords on your Red Hat Servers? If so can I ask some basic questions? Or would this question be better pitched in another area of the Forum, if so please suggest where, if anyone is willing to help me in this forum please let me know... (1 Reply)
Discussion started by: stevej123
1 Replies

3. Cybersecurity

John the ripper

Hi evryone, I have problem the john program. It works correctly but I can not make unshadow command because I have removed the file /usr/bin/john by mistake # cd ../run # ./john /root/shadow Loaded 2 password hashes with 2 different salts (FreeBSD MD5 ) letmein (root) letmein ... (5 Replies)
Discussion started by: bander2009
5 Replies
passwd(1openssl)						      OpenSSL							  passwd(1openssl)

NAME
passwd - compute password hashes SYNOPSIS
openssl passwd [-crypt] [-1] [-apr1] [-salt string] [-in file] [-stdin] [-noverify] [-quiet] [-table] {password} DESCRIPTION
The passwd command computes the hash of a password typed at run-time or the hash of each password in a list. The password list is taken from the named file for option -in file, from stdin for option -stdin, or from the command line, or from the terminal otherwise. The Unix standard algorithm crypt and the MD5-based BSD password algorithm 1 and its Apache variant apr1 are available. OPTIONS
-crypt Use the crypt algorithm (default). -1 Use the MD5 based BSD password algorithm 1. -apr1 Use the apr1 algorithm (Apache variant of the BSD algorithm). -salt string Use the specified salt. When reading a password from the terminal, this implies -noverify. -in file Read passwords from file. -stdin Read passwords from stdin. -noverify Don't verify when reading a password from the terminal. -quiet Don't output warnings when passwords given at the command line are truncated. -table In the output list, prepend the cleartext password and a TAB character to each password hash. EXAMPLES
openssl passwd -crypt -salt xx password prints xxj31ZMTZzkVA. openssl passwd -1 -salt xxxxxxxx password prints $1$xxxxxxxx$UYCIxa628.9qXjpQCjM4a.. openssl passwd -apr1 -salt xxxxxxxx password prints $apr1$xxxxxxxx$dxHfLAsjHkDRmG83UXe8K0. OpenSSL-0.9.8 Oct 11 2005 passwd(1openssl)
All times are GMT -4. The time now is 01:19 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy