Skip to content

In this entire repository i will tell you the best and the easiest way to use the very popular tool of kali Linux used for performing the brute force attack . Named as Jhon the Ripper

Notifications You must be signed in to change notification settings

SumitKumarGarsa/Jhon-the-Ripper

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

John the Ripper

John the Ripper is one of the most popular tools in Kali Linux for performing brute force attacks. This repository provides the best and easiest way to get started with this powerful tool.

John the Ripper Logo

Table of Contents


Introduction

John the Ripper is an open-source password-cracking tool designed to perform dictionary attacks and password hash testing. It's widely used in cybersecurity for penetration testing and security assessments.


Features

  • Supports a variety of hash types (MD5, SHA-256, etc.)
  • Highly customizable and scalable
  • Integrates well with other tools
  • Compatible with multiple platforms

Installation

  1. Clone the repository:

    git clone https://github.com/your-repo/john-the-ripper.git  
  2. Navigate to the directory:

    cd john-the-ripper  
  3. Install dependencies:

    sudo apt update && sudo apt install build-essential libssl-dev  
  4. Build the tool:

    make -s clean && make -sj4  

Usage Guide

To perform a brute force attack using John the Ripper, follow these steps:

  1. Create a wordlist or use a pre-existing one (e.g., rockyou.txt).
  2. Hash the password:
    echo -n "password" | md5sum  
  3. Run John the Ripper:
    john --wordlist=rockyou.txt --format=raw-md5 hashed_password.txt  

License

This project is licensed under the MIT License.


About

In this entire repository i will tell you the best and the easiest way to use the very popular tool of kali Linux used for performing the brute force attack . Named as Jhon the Ripper

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published