John The Ripper
โ๏ธ Cracking Modes in John
๐น Single Crack Mode
Example:
Uses internal wordlists and rules
Saves results to
~/.john/john.pot
View cracked passwords:
๐ธ Wordlist Mode
Applies word transformations
Allows custom or multiple wordlists
Often faster than brute-force
๐บ Incremental Mode
Tries every combo of defined charset (default:
a-zA-Z0-9
)Great for cracking unknown or complex passwords
Very resource-intensive
๐๏ธ Cracking Specific File Formats
John can crack password-protected files by using helper tools to extract hashes.
๐ General Workflow
๐ง Supported Tools
pdf2john
PDF password hashes
ssh2john
SSH private key hashes
mscash2john
MS Cache v2 hashes
keychain2john
macOS Keychain
rar2john
RAR file hashes
pfx2john
PKCS#12 hashes
truecrypt_volume2john
TrueCrypt
keepass2john
KeePass DB
zip2john
ZIP archives
office2john
MS Office docs
wpa2john
WPA/WPA2 handshakes
๐ Find all available tools on pwnbox:
๐ฌ Example Cracking Formats
AFS
john --format=afs hashes.txt
BSDi
john --format=bsdi hashes.txt
LM
john --format=LM hashes.txt
NT
john --format=nt hashes.txt
MySQL
john --format=mysql hashes.txt
raw-md5
john --format=raw-md5 hashes.txt
SHA-256
john --format=raw-sha256 hashes.txt
john --format=pdf hashes.txt
ZIP
john --format=zip hashes.txt
WPA
john --format=wpa hashes.txt
Oracle
john --format=oracle hashes.txt
... many more ...
๐งช Pro Tips
๐ Use multiple cracking modes for best results
๐ง Combine
--rules
with--wordlist
for advanced cracking๐งพ Monitor progress with
john --status
orjohn --show
๐ Cracked passwords are stored in:
~/.john/john.pot
Last updated