Difference between revisions of "John the Ripper"

From Free Software Directory
Jump to: navigation, search
(Created page with "{{Entry |Name=John the Ripper |Short description=Detects weak passwords |Full description=John the Ripper is a fast password cracker, currently available for many flavors of *nix...")
 
Line 4: Line 4:
 
|Full description=John the Ripper is a fast password cracker, currently available for many flavors of *nix (11 are officially supported, not counting different architectures) and other platforms. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various *nix flavors. Several other hash types are added with contributed patches.
 
|Full description=John the Ripper is a fast password cracker, currently available for many flavors of *nix (11 are officially supported, not counting different architectures) and other platforms. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various *nix flavors. Several other hash types are added with contributed patches.
 
|User level=none
 
|User level=none
 +
|Status=Live
 +
|Component programs=
 +
|Homepage URL=http://www.openwall.com/john/
 +
|VCS checkout command=
 +
|Computer languages=C,Shell script,Assembly
 +
|Documentation note=
 +
|Paid support=
 +
|IRC help=
 +
|IRC general=
 +
|IRC development=
 +
|Related projects=pam_pwcheck,Pwdutils
 +
|Keywords=security,cryptography,password,crack,hash types
 +
|Is GNU=n
 +
|Last review by=Janet Casey
 +
|Last review date=2009-09-23
 
|Submitted by=Database conversion
 
|Submitted by=Database conversion
 
|Submitted date=2011-04-01
 
|Submitted date=2011-04-01
|Version identifier=1.6
+
|Version identifier=1.6.38
|Version date=1998-12-04
+
|Version date=2005-05-12
|Version status=stable
+
|Version status=developmental
|Version download=http://www.openwall.com/john/dl/john-1.6.37.tar.gz
+
|Version download=
 
|License verified date=2003-09-19
 
|License verified date=2003-09-19
|Version comment=1.6 stable released 1998-12-04
+
|Version comment=1.6.38 devel released 2005-05-12
 +
}}
 +
{{Person
 +
|Role=Maintainer
 +
|Real name=Alexander Peslyak
 +
|Email=solar@openwall.com
 +
|Resource URL=
 +
}}
 +
{{Resource
 +
|Resource audience=Bug Tracking,Developer,Support
 +
|Resource kind=E-mail
 +
|Resource URL=mailto:solar@openwall.com
 
}}
 
}}
 
{{Software category
 
{{Software category
 
|Interface=command-line
 
|Interface=command-line
 +
|Security=encryption
 +
|Use=security
 
}}
 
}}
 
{{Project license
 
{{Project license

Revision as of 11:00, 12 April 2011

[edit]

John the Ripper

http://www.openwall.com/john/
Detects weak passwords

John the Ripper is a fast password cracker, currently available for many flavors of *nix (11 are officially supported, not counting different architectures) and other platforms. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various *nix flavors. Several other hash types are added with contributed patches.


Download

Download version 1.8.0 (stable)
released on 30 May 2013

Categories

Related Projects




Licensing

LicenseVerified byVerified onNotes
GPLv2orlaterJanet Casey19 September 2003



Leaders and contributors

Contact(s)Role
Alexander Peslyak Maintainer


Resources and communication

AudienceResource typeURI
Bug Tracking,Developer,SupportE-mailmailto:solar@openwall.com


Software prerequisites

This entry (in part or in whole) was last reviewed on 28 February 2017.



Entry

















Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.

The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.