John the Ripper Tutorial – Best Password Cracking Commands

John the Ripper is a popular password security auditing and password cracking tool that is used to test password strength, recover passwords, and practice cybersecurity tasks in Linux environments. It is widely used by cybersecurity learners, ethical hackers, and penetration testers for password analysis and security testing. Here’s what you can do with John the Ripper:

  • Test password strength.
  • Practice password recovery techniques.
  • Crack hash passwords for learning purposes.
  • Perform dictionary-based password attacks.
  • Learn Linux cybersecurity commands.
  • Explore password auditing and security testing.

What is John the Ripper?

John the Ripper is an open-source password cracking and password auditing tool available for Linux, Windows, and macOS systems. It supports different password hash types and provides multiple password cracking modes such as dictionary attacks, wordlist attacks, and incremental brute-force methods.

Note: John the Ripper should only be used for ethical hacking, cybersecurity learning, password recovery, and authorized security testing purposes. Do not use password cracking tools against accounts, systems, or files without proper permission.

Install John the Ripper

Below are the simple steps to install John the Ripper on Debian-based Linux distributions that use the apt package manager such as Ubuntu, Kali Linux, Linux Mint, Parrot OS, and Debian.

Step 1 – Update Linux Packages

Update all Linux packages using this command:

sudo apt update && sudo apt upgrade -y

Step 2 – Install John the Ripper

Install John the Ripper using this command:

sudo apt install john -y

Step 3 – Check Installation

Check whether John the Ripper is installed successfully:

john --version

Best John the Ripper Commands

As we install John the Ripper on Debian-based Linux Terminal, it needs commands to perform password auditing and password cracking tasks. Below are some important John the Ripper commands for beginners.

Crack passwords using default mode:

john hashes.txt

Use a wordlist for password cracking:

john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt

Show cracked passwords:

john --show hashes.txt

Detect hash type automatically:

john --format=auto hashes.txt

Run incremental brute-force mode:

john --incremental hashes.txt

Use single crack mode:

john --single hashes.txt

Resume paused session:

john --restore

Save session name:

john --session=test hashes.txt

Basic John the Ripper Commands

Basic John the Ripper commands help manage password cracking sessions, check supported hash types, and perform password auditing tasks.

Show help menu:

john --help

List supported hash formats:

john --list=formats

Check wordlist rules:

john --wordlist=wordlist.txt --rules hashes.txt

Benchmark system performance:

john --test

Types of John the Ripper Commands

  • john hashes.txt : Performs basic password cracking.
  • john –wordlist=rockyou.txt hashes.txt : Uses a wordlist attack.
  • john –incremental hashes.txt : Runs brute-force password cracking.
  • john –single hashes.txt : Performs single crack mode attack.
  • john –show hashes.txt : Displays cracked passwords.
  • john –restore : Restores paused cracking sessions.
  • john –list=formats : Shows supported hash formats.

Choose the command you want and John the Ripper will automatically perform the selected password auditing or password cracking task directly inside the Linux terminal.

See also  Top 50 Useful Linux Commands for Beginners - PDF | 2026

End Note

John the Ripper is one of the most popular password auditing and password cracking tools for cybersecurity learning and security testing. It provides multiple password attack modes, supports different hash types, and helps beginners practice password security analysis directly from the Linux terminal environment.

SHARE THIS POST:

Leave a Reply

Your email address will not be published. Required fields are marked *