You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
zip2john zipfile > ziphash.john
john ziphash.john --wordlist=wordlist.txt
Crack /etc/shadow
unshadow passwd.txt shadow.txt > passwords.txt
john --wordlist=/usr/share/wordlists/rockyou.txt passwords.txt
Identifying Hash Types
hashid <file containing hashes>
hashid -m <file containing hashes>### Shows hashcat mode
hashid -j <file containing hashes>### Shows john format
Converting encrypted files into a format supported by John
unshadow etc_passwd_file etc_shadow_file | tee unshadowed_file
ssh2john.py encrypted_SSH_key_file | tee SSH_key.john
keepass2john kdb_file | tee keepass_hash.john
rar2john encrypted_rar_file | tee rar_file_hash.john
7z2john encrypted_7z_file | tee 7z_file_hash.john
Cracking Hashes using John the Ripper
john --list=formats ### outputs all supported formats
john <hash file> --wordlist=<path to wordlist>
john <hash file> --show (shows cracked hashes)
john <hash file> --wordlist=<path to wordlist> --format=<hash format>
john <hash file> --incremental ### uses ASCII incremental mode
john <hash file> --incremental=digits # uses digit incremental (mode: 0 to 99999999999999999999)
Cracking Hashes using HashCat
hashcat -m <hash type mode> -a <attack mode><hash file><path to wordlist>