📄 options
字号:
John the Ripper's Command Line Options========================================You can list any number of password files on John's command line, and alsospecify some of the following options (all of them are case sensitive, butcan be abbreviated; you can also use the GNU-style long options syntax): -single "single crack" modeEnables the "single crack" mode, using rules from [List.Rules:Single]. -wordfile:FILE wordlist mode, read words from FILE, -stdin or from stdinThese are used to enable the wordlist mode. -rules enable rules for wordlist modeEnables wordlist rules, that are read from [List.Rules:Wordlist]. -incremental[:MODE] incremental mode [using section MODE]Enables the incremental mode, using the specified ~/john.ini definition(section [Incremental:MODE], or [Incremental:All] by default). -external:MODE external mode or word filterEnables an external mode, using external functions defined in ~/john.ini's[List.External:MODE] section. -stdout[:LENGTH] no cracking, write words to stdoutWhen used with a cracking mode, except for "single crack", makes Johnprint the words it generates to stdout instead of cracking. While applyingwordlist rules, the significant password length is assumed to be LENGTH,or unlimited by default. -restore[:FILE] restore an interrupted sessionContinues an interrupted cracking session, reading point information fromthe specified file (~/restore by default). -session:FILE set session file name to FILEAllows you to specify another point information file's name to use forthis cracking session. This is useful for running multiple instances ofJohn in parallel, or just to be able to recover an older session later,not always continue the latest one. -status[:FILE] print status of a session [from FILE]Prints status of an interrupted or running session. To get an up to datestatus information of a detached running session, send that copy of Johna SIGHUP before using this option. -makechars:FILE make a charset, overwriting FILEGenerates a charset file, based on character frequencies from ~/john.pot,for use with the incremental mode. The entire ~/john.pot will be used forthe charset file unless you specify some password files. You can also usean external filter() routine with this option. -show show cracked passwordsShows the cracked passwords in a convenient form. You should also specifythe password files. You can use this option while another John is cracking,to see what it did so far. -test perform a benchmarkBenchmarks all the enabled ciphertext format crackers, and tests them forcorrect operation at the same time. -users:[-]LOGIN|UID[,..] load this (these) user(s) onlyAllows you to filter a few accounts for cracking, etc. A dash before thelist can be used to invert the check (that is, load all the users thataren't listed). -groups:[-]GID[,..] load this (these) group(s) onlyTells John to load users of the specified group(s) only. -shells:[-]SHELL[,..] load this (these) shell(s) onlyThis option is useful to load accounts with a valid shell only, or not toload accounts with a bad shell. You can omit the path before a shell name,so '-shells:csh' will match both '/bin/csh' and '/usr/bin/csh', while'-shells:/bin/csh' will only match '/bin/csh'. -salts:[-]COUNT set a passwords per salt limitThis feature sometimes allows to achieve better performance. For exampleyou can crack only some salts using '-salts:2' faster, and then crack therest using '-salts:-2'. Total cracking time will be about the same, butyou will get some passwords cracked earlier. -format:NAME force ciphertext format NAMEAllows you to override the ciphertext format detection. Currently, validformat names are DES, BSDI, MD5, BF, AFS, LM. You can use this option whencracking or with '-test'. Note that John can't crack password files withdifferent ciphertext formats at the same time. -savemem:LEVEL enable memory saving, at LEVEL 1..3You might need this option if you don't have enough memory, or don't wantJohn to affect other processes too much. Level 1 tells John not to wastememory on login names, so you won't see them while cracking. Higher levelshave a performance impact: you should probably avoid using them unless Johndoesn't work or gets into swap otherwise. Additional Utilities----------------------There're some utilities in John's run directory: unshadow PASSWORD-FILE SHADOW-FILECombines the passwd and shadow files (when you already have access toboth) for use with John. You might need this since if you only used yourshadow file, the GECOS information wouldn't be used by the "single crack"mode, and also you wouldn't be able to use the '-shells' option. You'llusually want to redirect the output of 'unshadow' to a file. unafs DATABASE-FILE CELL-NAMEGets password hashes out of the binary AFS database, and produces a fileusable by John (again, you should redirect the output yourself). unique OUTPUT-FILERemoves duplicates from a wordlist (read from stdin), without changingthe order. You might want to use this with John's '-stdout' option, ifyou got a lot of disk space to trade for the reduced cracking time. mailer PASSWORD-FILEA shell script to send mail to all the users who got weak passwords. Youshould edit the message inside before using.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -