John The Ripper
Usage
john --wordlist=/usr/share/seclists/Passwords/Leaked-Databases/rockyou.txt ./hash.txt --format=raw-sha256 --fork=2
Declaring Structure
john --wordlist=/usr/share/seclists/Passwords/Leaked-Databases/rockyou.txt ./hash.txt --format=dynamic_85 --fork=2
Rules
- Rule syntax
- Create a local rules file, e.g.
/etc/john-local.conf
or /usr/share/john/john-local.conf
- Create config for mutations, e.g. border mutation
[List.Rules:border]
$[0-9]$[0-9]
- Run john with parameter
--rules=border
Existing Rules
l33t
, l33tsp34k
NT
, case mutation
- Example for
best64
john --wordlist=single_password.txt --rules=best64 --stdout > out.txt
- Some salted passwords need dynamic rules
Social_engineering