John the Ripper password cracker v-1.22 released.

John the Ripper password cracker v-1.22 released.

changelog v1.22 Nov 4, 2014 JimF
+ Added scrypt and django-scrypt
+ Enable cracking of more EIGRP hashes
+ Overhaul of all formats that use base64decode(). It adds a NULL.

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting
different architectures), Windows, DOS, BeOS, and OpenVMS (the latter requires a contributed patch). Its primary purpose is to detect weak
Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are
Kerberos/AFS and Windows LM hashes, as well as DES-based tripcodes, plus many more hashes and ciphers in “community enhanced” -jumbo versions and/or with other contributed patches.

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), Windows, DOS, BeOS, and OpenVMS (the latter requires a contributed patch).

John the Ripper is a fast password cracker, currently available for
many flavors of Unix (11 are officially supported, not counting
different architectures), Windows, DOS, BeOS, and OpenVMS (the latter
requires a contributed patch).

How to install.
See INSTALL for information on installing John on your system.
How to use.
To run John, you need to supply it with some password files and optionally specify a cracking mode, like this, using the default order
of modes and assuming that “passwd” is a copy of your password file:

Download master Zipball : JhonTheRipper-bleeding-jumbo.zip (31. 4 MB) 
or git Clone |
Source : http://openwall.info/wiki/john/patches