John the Ripper password cracker

John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance.

 

Proceed to John the Ripper Pro homepage for your OS:
  • John the Ripper Pro for Linux
  • John the Ripper Pro for Mac OS X
  • On Windows, consider Hash Suite (developed by a contributor to John the Ripper)

Download one of the latest official free versions (release notes):

 

  • John the Ripper 1.7.9 (Unix - sources, tar.gz, 848 KB) and its signature
  • John the Ripper 1.7.9 (Unix - sources, tar.bz2, 701 KB) and its signature
  • John the Ripper 1.7.9 (Windows - binaries, ZIP, 2029 KB) and its signature

Download the latest community-enhanced version (release notes):

 

  • John the Ripper 1.7.9-jumbo-6 (Unix - sources, tar.gz, 1892 KB) and its signature
  • John the Ripper 1.7.9-jumbo-6 (Unix - sources, tar.bz2, 1564 KB) and its signature
  • John the Ripper 1.7.9-jumbo-5 (Windows - binaries, ZIP, 3845 KB) and its signature
   
This version integrates lots of contributed patches adding GPU support (CUDA and OpenCL), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's. Requires OpenSSL 0.9.7 or newer. There are unofficial binary builds (by John the Ripper user community members) for Windows, Linux, Solaris, and Mac OS X.

To verify authenticity and integrity of your John the Ripper downloads, please use our PGP public key. You will most likely need to download a "Windows - binaries" archive above. However, if you choose to download the source code instead (for a specific good reason), then please refer to these pages on how to extract John the Ripper source code from the tar.gz and tar.bz2 archives and how to build (compile) it. You may also consider the patches and unofficial builds on the contributed resources list further down this page.

These and older versions of John the Ripper, patches, unofficial builds, and many other related files are also available from the Openwall file archive.

You may browse the documentation for John the Ripper online, including a summary of changes between versions. Also relevant is this presentation on the history of password security by Solar Designer, the author of John the Ripper.

There's a wiki section with John the Ripper user community resources. The more experienced users and software developers may browse the source code for John the Ripper online, along with revision history information for each source file.

There's a collection of wordlists for use with John the Ripper. It includes lists of common passwords, wordlists for 20+ human languages, and files with the common passwords and unique words for all the languages combined, also with mangling rules applied and any duplicates purged.

Additionally, you may download or purchase Openwall GNU/*/Linux on a CD, which includes a pre-built copy of John the Ripper 1.7.8 ready for use without requiring another OS and without having to install on a hard disk (although that is supported). You may not even have a hard disk, or it may be fully occupied by an existing OS install which won't be used or touched. You just boot off the CD, enter the shell (bash and tcsh are included), optionally configure networking with the setup tool (say, if you need to transfer password files to the RAM disk), and start using John! The CD-booted system is fully functional, you may even let it go multi-user with virtual consoles and remote shell access. Besides John, also included and available for use right off the CD are Nmap port scanner, SSH (OpenSSH), FTP (lftp, vsftpd), and Telnet clients and servers, a text Web browser with SSL support (ELinks), an SMTP mail system (Postfix), a POP3 daemon (popa3d), a MUA with POP3 and IMAP client support (Mutt), and more.

An implementation of one of the modern password hashes found in John is also available separately for use in your software or on your servers.

There's a proactive password strength checking module for PAM-aware password changing programs, which can be used to prevent your users from choosing passwords that would be easily cracked with programs like John.

We may help you integrate modern password hashing with crypt_blowfish and/or proactive password strength checking with pam_passwdqc into your OS installs, please check out our services.

There's a mailing list where you can share your experience with John the Ripper and ask questions. Please be sure to specify an informative message subject whenever you post to the list (that is, something better than "question" or "problem"). To subscribe, enter your e-mail address below or send an empty message to <john-users-subscribe at lists.openwall.com>. You will be required to confirm your subscription by "replying" to the automated confirmation request that will be sent to you. You will be able to unsubscribe at any time and we will not use your e-mail address for any other purpose or share it with a third party. However, if you post to the list, other subscribers and those viewing the archives may see your address(es) as specified on your message. The list archive is available locally, as well as via Gmane and MARC. Additionally, there's a list of selected most useful and currently relevant postings on the community wiki.

你可能感兴趣的:(software,password,general,commercial,specific)