This script is for Slackware 13.1 only and may be outdated.

SlackBuilds Repository

13.1 > System > john (1.7.3.1)

John the Ripper is a fast password cracker.  Its primary purpose is to detect 
weak passwords. Besides several crypt(3) password hash types most commonly
found on various Unix flavors, supported out of the box are Kerberos AFS and
Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

This script includes an option to apply Ryan Lim's patch for JTR to support
MPI. MPI allows you to use multiple processors on a system or even a cluster
of systems for cracking passwords using JTR. If you decide to apply this, you
will also need openmpi installed. JTR's author does not recommend using the
patch, so use it at your own risk - for more information, see this link:
http://www.openwall.com/lists/john-users/2005/08/24/4
This script also contains an optional "jumbo" patch, which enables processing
of many password hash types and ciphers that are not otherwise supported.

Note this will not build in parallel; unset MAKEFLAGS if you have problems.

Maintained by: Murat D. Kadirov
Keywords: john the ripper,jtr,cracker
ChangeLog: john

Homepage:
http://www.openwall.com/john/

Source Downloads:
john-1.7.3.1.tar.bz2 (4a8de450ff332bd0c7cbc573eb5032d9)

Download SlackBuild:
john.tar.gz
john.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Validated for Slackware 13.1

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2024 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds