![]() format=NAME force hash of type NAME.John works great with other programs, since it does many things well, and each of those capabilities are valuable on their own and can be combined with other programs. devices=N set OpenCL device(s) (see -list=opencl-devices) list=WHAT list capabilities, see -list=help or doc/OPTIONS node=MIN/TOTAL this node's number range out of TOTAL count save-memory=LEVEL enable memory saving, at LEVEL 1.3 salts=COUNT load salts with COUNT hashes shells=SHELL load users with this (these) shell(s) only groups=GID load users of this (these) group(s) only users=LOGIN|UID load this (these) user(s) only test run tests and benchmarks for TIME seconds each session=NAME give a new session the NAME subsets "subsets" mode (see doc/SUBSETS) external=MODE external mode or word filter ![]() mask mask mode using MASK (or default from nf) rules|:rule)] enable word mangling rules for prince PRINCE mode, read words from FILE dupe-suppression suppress all dupes in wordlist (and force preload) loopback like -wordlist, but extract words from a. pipe like -stdin, but bulk reads, and allows rules wordlist -stdin wordlist mode, read words from FILE or stdin Interrupted session can be continued with the following: $ john -restore Options Usage (1.8.0): john To retrieve the cracked passwords, run: $ john -show passwd If you want to restrict it to the wordlist mode only (permitting the use of word mangling rules): $ john -wordlist=password.lst -rules passwd To run John, firstly supply it with some password files and if you wish, specify a cracking mode: $ john passwd Windows users can find detailed documentation on the official John the Ripper Wiki page. $ git clone git:///magnumripper/JohnTheRipper -b bleeding-jumbo john
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |