Email Address:
admin@achik.us achikahmed.info@gmail.com
Our Social Media Profiles:
John the Ripper is a popular password security auditing and password cracking tool that is used to test password strength, recover passwords, and practice cybersecurity tasks in Linux environments. It is widely used by cybersecurity learners, ethical hackers, and penetration testers for password analysis and security testing. Here’s what you can do with John the Ripper:
John the Ripper is an open-source password cracking and password auditing tool available for Linux, Windows, and macOS systems. It supports different password hash types and provides multiple password cracking modes such as dictionary attacks, wordlist attacks, and incremental brute-force methods.
Note: John the Ripper should only be used for ethical hacking, cybersecurity learning, password recovery, and authorized security testing purposes. Do not use password cracking tools against accounts, systems, or files without proper permission.
Below are the simple steps to install John the Ripper on Debian-based Linux distributions that use the apt package manager such as Ubuntu, Kali Linux, Linux Mint, Parrot OS, and Debian.
Update all Linux packages using this command:
sudo apt update && sudo apt upgrade -yInstall John the Ripper using this command:
sudo apt install john -yCheck whether John the Ripper is installed successfully:
john --versionAs we install John the Ripper on Debian-based Linux Terminal, it needs commands to perform password auditing and password cracking tasks. Below are some important John the Ripper commands for beginners.
Crack passwords using default mode:
john hashes.txtUse a wordlist for password cracking:
john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txtShow cracked passwords:
john --show hashes.txtDetect hash type automatically:
john --format=auto hashes.txtRun incremental brute-force mode:
john --incremental hashes.txtUse single crack mode:
john --single hashes.txtResume paused session:
john --restoreSave session name:
john --session=test hashes.txtBasic John the Ripper commands help manage password cracking sessions, check supported hash types, and perform password auditing tasks.
Show help menu:
john --helpList supported hash formats:
john --list=formatsCheck wordlist rules:
john --wordlist=wordlist.txt --rules hashes.txtBenchmark system performance:
john --testChoose the command you want and John the Ripper will automatically perform the selected password auditing or password cracking task directly inside the Linux terminal.
John the Ripper is one of the most popular password auditing and password cracking tools for cybersecurity learning and security testing. It provides multiple password attack modes, supports different hash types, and helps beginners practice password security analysis directly from the Linux terminal environment.