Sponsored Content
Full Discussion: John the ripper
Special Forums Cybersecurity John the ripper Post 302438043 by bander2009 on Saturday 17th of July 2010 08:29:12 PM
Old 07-17-2010
I have tried to install it but after installing it, the problem is still also when I do the command which john it gives me output that seems john is not installed so could you tell me how can install it.

I have install it as sourse code from here John the Ripper - how to install
 

2 More Discussions You Might Find Interesting

1. UNIX and Linux Applications

John the Ripper application question

Hi Friends I like to know one thing the how exactly john the ripper works. I have search in google, read lots of tutorial on that. I have simple question, can I get the password for the encrypted file for the following example. e.g : Abc.txt file contents "This is Joy" Now I... (4 Replies)
Discussion started by: itsjoy2u
4 Replies

2. Red Hat

John the Ripper / CRACK

Has anyone used JTR or CRACK to check if you have any weak passwords on your Red Hat Servers? If so can I ask some basic questions? Or would this question be better pitched in another area of the Forum, if so please suggest where, if anyone is willing to help me in this forum please let me know... (1 Reply)
Discussion started by: stevej123
1 Replies
MAILER(8)						      System Manager's Manual							 MAILER(8)

NAME
mailer - script to warn users about their weak passwords SYNOPSIS
mailer password-files DESCRIPTION
This manual page documents briefly the mailer command, which is part of the john package. This manual page was written for the Debian GNU/Linux distribution because the original program does not have a manual page. john, better known as John the Ripper, is a tool to find weak passwords of users in a server. The mailer tool is useful to inform users which have been found to be using weak passwords by mail. You should edit the message mailer will send to the users, but remember to copy the script to a safe place before editing it, as it's gen- erally a bad idea to modify things living in /usr. SEE ALSO
john(8), unafs(8), unique(8), unshadow(8). The programs are documented fully by John's documentation, which should be available in /usr/share/doc/john or other location, depending on your system. AUTHOR
This manual page was written by Jordi Mallach <jordi@debian.org>, for the Debian GNU/Linux system (but may be used by others). John the Ripper and mailer were written by Solar Designer <solar@openwall.com>. The complete list of contributors can be found in the CRED- ITS file in the documentation directory. john June 03, 2004 MAILER(8)
All times are GMT -4. The time now is 12:20 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy