Difference between revisions of "John the Ripper"
(Created page with "{{Entry |Name=John the Ripper |Short description=Detects weak passwords |Full description=John the Ripper is a fast password cracker, currently available for many flavors of *nix...") |
(New version) |
||
(One intermediate revision by one other user not shown) | |||
Line 3: | Line 3: | ||
|Short description=Detects weak passwords | |Short description=Detects weak passwords | ||
|Full description=John the Ripper is a fast password cracker, currently available for many flavors of *nix (11 are officially supported, not counting different architectures) and other platforms. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various *nix flavors. Several other hash types are added with contributed patches. | |Full description=John the Ripper is a fast password cracker, currently available for many flavors of *nix (11 are officially supported, not counting different architectures) and other platforms. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various *nix flavors. Several other hash types are added with contributed patches. | ||
+ | |Homepage URL=http://www.openwall.com/john/ | ||
|User level=none | |User level=none | ||
+ | |Computer languages=C,Shell script,Assembly | ||
+ | |Related projects=pam_pwcheck,Pwdutils | ||
+ | |Keywords=security,cryptography,password,crack,hash types | ||
+ | |Version identifier=1.8.0 | ||
+ | |Version date=2013/05/30 | ||
+ | |Version status=stable | ||
+ | |Version download=http://www.openwall.com/john/j/john-1.8.0.tar.xz | ||
+ | |Version comment=1.8.0 stable released 2013-05-30 | ||
+ | |Last review by=Alejandroindependiente | ||
+ | |Last review date=2017/02/28 | ||
|Submitted by=Database conversion | |Submitted by=Database conversion | ||
|Submitted date=2011-04-01 | |Submitted date=2011-04-01 | ||
− | | | + | |Status= |
− | | | + | |Is GNU=No |
− | |||
− | |||
|License verified date=2003-09-19 | |License verified date=2003-09-19 | ||
− | |||
− | |||
− | |||
− | |||
}} | }} | ||
{{Project license | {{Project license | ||
Line 21: | Line 26: | ||
|License verified date=2003-09-19 | |License verified date=2003-09-19 | ||
}} | }} | ||
+ | {{Person | ||
+ | |Real name=Alexander Peslyak | ||
+ | |Role=Maintainer | ||
+ | |Email=solar@openwall.com | ||
+ | |Resource URL= | ||
+ | }} | ||
+ | {{Resource | ||
+ | |Resource audience=Bug Tracking,Developer,Support | ||
+ | |Resource kind=E-mail | ||
+ | |Resource URL=mailto:solar@openwall.com | ||
+ | }} | ||
+ | {{Software category | ||
+ | |Interface=command-line | ||
+ | |Security=encryption | ||
+ | |Use=security | ||
+ | }} | ||
+ | {{Featured}} |
Latest revision as of 20:38, 27 February 2017
John the Ripper
http://www.openwall.com/john/
Detects weak passwords
John the Ripper is a fast password cracker, currently available for many flavors of *nix (11 are officially supported, not counting different architectures) and other platforms. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various *nix flavors. Several other hash types are added with contributed patches.
Licensing
License
Verified by
Verified on
Notes
Leaders and contributors
Contact(s) | Role |
---|---|
Alexander Peslyak | Maintainer |
Resources and communication
Audience | Resource type | URI |
---|---|---|
Bug Tracking,Developer,Support | mailto:solar@openwall.com |
Software prerequisites
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.