Difference between revisions of "John the Ripper"

From Free Software Directory
Jump to: navigation, search
(Created page with "{{Entry |Name=John the Ripper |Short description=Detects weak passwords |Full description=John the Ripper is a fast password cracker, currently available for many flavors of *nix...")
 
(New version)
 
(One intermediate revision by one other user not shown)
Line 3: Line 3:
 
|Short description=Detects weak passwords
 
|Short description=Detects weak passwords
 
|Full description=John the Ripper is a fast password cracker, currently available for many flavors of *nix (11 are officially supported, not counting different architectures) and other platforms. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various *nix flavors. Several other hash types are added with contributed patches.
 
|Full description=John the Ripper is a fast password cracker, currently available for many flavors of *nix (11 are officially supported, not counting different architectures) and other platforms. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various *nix flavors. Several other hash types are added with contributed patches.
 +
|Homepage URL=http://www.openwall.com/john/
 
|User level=none
 
|User level=none
 +
|Computer languages=C,Shell script,Assembly
 +
|Related projects=pam_pwcheck,Pwdutils
 +
|Keywords=security,cryptography,password,crack,hash types
 +
|Version identifier=1.8.0
 +
|Version date=2013/05/30
 +
|Version status=stable
 +
|Version download=http://www.openwall.com/john/j/john-1.8.0.tar.xz
 +
|Version comment=1.8.0 stable released 2013-05-30
 +
|Last review by=Alejandroindependiente
 +
|Last review date=2017/02/28
 
|Submitted by=Database conversion
 
|Submitted by=Database conversion
 
|Submitted date=2011-04-01
 
|Submitted date=2011-04-01
|Version identifier=1.6
+
|Status=
|Version date=1998-12-04
+
|Is GNU=No
|Version status=stable
 
|Version download=http://www.openwall.com/john/dl/john-1.6.37.tar.gz
 
 
|License verified date=2003-09-19
 
|License verified date=2003-09-19
|Version comment=1.6 stable released 1998-12-04
 
}}
 
{{Software category
 
|Interface=command-line
 
 
}}
 
}}
 
{{Project license
 
{{Project license
Line 21: Line 26:
 
|License verified date=2003-09-19
 
|License verified date=2003-09-19
 
}}
 
}}
 +
{{Person
 +
|Real name=Alexander Peslyak
 +
|Role=Maintainer
 +
|Email=solar@openwall.com
 +
|Resource URL=
 +
}}
 +
{{Resource
 +
|Resource audience=Bug Tracking,Developer,Support
 +
|Resource kind=E-mail
 +
|Resource URL=mailto:solar@openwall.com
 +
}}
 +
{{Software category
 +
|Interface=command-line
 +
|Security=encryption
 +
|Use=security
 +
}}
 +
{{Featured}}

Latest revision as of 20:38, 27 February 2017


[edit]

John the Ripper

http://www.openwall.com/john/
Detects weak passwords

John the Ripper is a fast password cracker, currently available for many flavors of *nix (11 are officially supported, not counting different architectures) and other platforms. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various *nix flavors. Several other hash types are added with contributed patches.





Licensing

License

Verified by

Verified on

Notes

Verified by

Janet Casey

Verified on

19 September 2003




Leaders and contributors

Contact(s)Role
Alexander Peslyak Maintainer


Resources and communication

AudienceResource typeURI
Bug Tracking,Developer,SupportE-mailmailto:solar@openwall.com


Software prerequisites




Entry


















Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.

The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.