SlackBuilds Repository

13.0 > System > john (1.7.3.1)

John the Ripper is a fast password cracker. Its primary purpose is to detect
weak passwords. Besides several crypt(3) password hash types most commonly
found on various Unix flavors, supported out of the box are Kerberos AFS and
Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

This script includes an option to apply Ryan Lim's patch for JTR to support
MPI. MPI allows you to use multiple processors on a system or even a cluster
of systems for cracking passwords using JTR. If you decide to apply this, you
will also need openmpi installed. JTR's author does not recommend using the
patch, so use it at your own risk - for more information, see this link:
http://www.openwall.com/lists/john-users/2005/08/24/4
This script also contains an optional "jumbo" patch, which enables processing
of many password hash types and ciphers that are not otherwise supported.

Note this will not build in parallel; unset MAKEFLAGS if you have problems.

Maintained by: Murat D. Kadirov
Approved by: dsomero
Keywords: john the ripper,jtr,cracker

Homepage:
http://www.openwall.com/john/

Source Downloads:
john-1.7.3.1.tar.bz2 (4a8de450ff332bd0c7cbc573eb5032d9)

Download SlackBuild:
john.tar.gz
john.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

[  Exec: 0.028 sec  |  Load: 0.27 0.10 0.08  ]

© 2006-2014 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds
Web Design by WebSight Designs |  Managed Hosting by OnyxLight Communications