🔐John the Ripper (JtR)

Advanced Password Cracking Software

📋 Overview

John the Ripper (JtR) adalah open-source password cracking tool yang digunakan untuk mendeteksi password yang lemah. Dikembangkan oleh Openwall, John the Ripper menjadi salah satu tool yang paling powerful dan fleksibel untuk password recovery dan security auditing.

🎯 Key Features

🔐 Multi-Algorithm Support

  • Hash Types: MD5, SHA-1, SHA-256, SHA-512, bcrypt, scrypt

  • Database Hashes: MySQL, Oracle, PostgreSQL, SQL Server

  • Operating Systems: Windows LM/NTLM, Unix shadow, macOS keychain

  • Archive Formats: ZIP, RAR, 7-Zip, PDF, Office documents

  • Password Managers: KeePass, LastPass, 1Password

Cracking Modes

  • Wordlist Attack - Dictionary-based password testing

  • Single Crack - Simple password variations

  • Incremental - Brute force with custom charsets

  • External Mode - Custom word generation rules

  • Markov Mode - Statistical password generation

🔧 Advanced Features

  • GPU Acceleration - OpenCL/CUDA support for GPU cracking

  • Rule Engine - Advanced password transformation rules

  • Session Management - Resume interrupted cracking sessions

  • Distributed Cracking - Multi-system support

  • Hybrid Attacks - Combination of multiple attack vectors

🛡️ Security Testing

  • Password Policy Testing - Verify password strength policies

  • Shadow File Analysis - Unix password file cracking

  • SAM File Testing - Windows password cracking

  • Database Auditing - Test database password security

  • Application Testing - Application-specific password cracking

🚀 Installation

Linux Installation

Windows Installation

macOS Installation

Docker Installation

🔧 Basic Usage

Command Structure

Common Commands

🎯 Attack Modes

Wordlist Attack

Single Crack Mode

Incremental Mode

Hybrid Attacks

📊 Hash Format Support

Common Hash Types

Database Hashes

Archive and Document Hashes

🔧 Advanced Features

Custom Rules

Custom Rule Examples

GPU Acceleration

Session Management

🎯 Practical Examples

Unix Password Cracking

Windows Password Cracking

Database Password Auditing

Archive Password Recovery

Web Application Testing

📈 Performance Optimization

CPU Optimization

GPU Optimization

Wordlist Optimization

🔧 Custom Wordlists

Creating Targeted Wordlists

Wordlist Combination

📊 Output and Reporting

Showing Results

Status Monitoring

Log Files

🔗 Integration and Automation

Bash Automation

Python Integration

CI/CD Integration

🎓 Learning Resources

Official Documentation

Training Resources

Wordlist Resources

Debug Mode

Performance Issues

  • Authorization: Only crack passwords you own or have permission

  • Purpose: Use for legitimate security testing and education

  • Documentation: Keep records of authorization

  • Scope: Stay within defined testing boundaries

Best Practices

  • Wordlists: Use legally obtained wordlists

  • Results: Handle cracked passwords responsibly

  • Storage: Secure sensitive hash and password files

  • Cleanup: Remove temporary files and sensitive data

Privacy Protection

  • Data Minimization: Only collect necessary data

  • Secure Storage: Encrypt sensitive files

  • Access Control: Limit access to cracking results

  • Retention: Don't keep cracked passwords longer than necessary


⚠️ Legal Notice: John the Ripper should only be used for legitimate security testing, password recovery, and educational purposes. Unauthorized password cracking is illegal.

⚡ Pro Tip: Start with fast single crack mode, then wordlist attacks, and finally incremental modes for the best chance of success within reasonable timeframes.

📅 Last Updated: 2024

Last updated