⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 options

📁 UNIX、linux密码的破密程序源代码实现
💻
字号:
	John the Ripper's command line syntax.When invoked with no command line arguments, "john" prints its usagesummary.The supported command line arguments are password file names andoptions.  Many of the supported options accept additional arguments.You can list any number of password files right on the command line of"john".  You do not have to specify any options.  If valid passwordfiles are specified but no options are given, John will go throughthe default selection of cracking modes with their default settings.Options may be specified along with password files or on their own,although some require that password files be specified and some do notsupport operation on password files.All options are case sensitive, can be abbreviated as long as theabbreviations are unambiguous, can be prefixed with two dashes(GNU-style) or with one dash, and can use "=" or ":" to indicate anargument (if supported for a given option).The supported options are as follows, square brackets denote optionalarguments:--single			"single crack" modeEnables the "single crack" mode, using rules from the configurationfile section [List.Rules:Single].--wordlist=FILE			wordlist mode, read words from FILE,--stdin				or from stdinThese are used to enable the wordlist mode.--rules				enable word mangling rules for wordlist modeEnables word mangling rules that are read from [List.Rules:Wordlist].--incremental[=MODE]		"incremental" mode [using section MODE]Enables the "incremental" mode, using the specified configuration filedefinition (section [Incremental:MODE], or [Incremental:All] by defaultexcept for LM hashes for which the default is [Incremental:LanMan]).--external=MODE			external mode or word filterEnables an external mode, using external functions defined in section[List.External:MODE].--stdout[=LENGTH]		just output candidate passwordsWhen used with a cracking mode, except for "single crack", makes Johnoutput the candidate passwords it generates to stdout instead ofactually trying them against password hashes; no password files may bespecified when this option is used.  If a LENGTH is given, Johnassumes that to be the significant password length and only producespasswords up to that length.--restore[=NAME]		restore an interrupted sessionContinues an interrupted cracking session, reading state informationfrom the specified session file or from $JOHN/john.rec by default.--session=NAME			give a new session the NAMEThis option can only be used when starting a new cracking session andits purpose is to give the new session a name (to which John willappend the ".rec" suffix to form the session file name).  This isuseful for running multiple instances of John in parallel or to beable to later recover a session other than the last one you interrupt.--status[=NAME]			print status of a session [called NAME]Prints status of an interrupted or running session.  Note that on aUnix-like system, you can get a detached running session to update itssession file by sending a SIGHUP to the appropriate "john" process;then use this option to read in and display the status.--make-charset=FILE		make a charset, overwriting FILEGenerates a charset file based on character frequencies from$JOHN/john.pot, for use with "incremental" mode.  The entire$JOHN/john.pot will be used for the charset generation unless youspecify some password files in which case only the cracked passwordswhich correspond to those password files will be used.  You can alsouse an external filter() routine with this option.--show				show cracked passwordsShows the cracked passwords for given password files (which you mustspecify).  You can use this option while another instance of John iscracking to see what John did so far; to get the most up to dateinformation, first send a SIGHUP to the appropriate "john" process.--test				perform a benchmarkBenchmarks all of the compiled in hashing algorithms and tests themfor proper operation.--users=[-]LOGIN|UID[,..]	[do not] load this (these) user(s)Allows you to select just a few accounts for cracking or for otheroperations.  A dash before the list can be used to invert the check(that is, load information for all the accounts that are not listed).--groups=[-]GID[,..]		load users [not] of this (these) group(s)Tells John to load (or to not load) information for accounts in thespecified group(s) only.--shells=[-]SHELL[,..]		load users with[out] this (these) shell(s)This option is useful to load accounts with a valid shell only or tonot load accounts with a bad shell.  You can omit the path before ashell name, so "--shells=csh" will match both "/bin/csh" and"/usr/bin/csh", while "--shells=/bin/csh" will only match "/bin/csh".--salts=[-]COUNT		load salts with[out] at least COUNT passwordsThis is a feature which allows to achieve better performance in somespecial cases.  For example, you can crack only some salts using"--salts=2" faster and then crack the rest using "--salts=-2".  Totalcracking time will be about the same, but you will likely get somepasswords cracked earlier.--format=NAME			force ciphertext format NAMEAllows you to override the hash type detection.  Currently, valid"format names" are DES, BSDI, MD5, BF, AFS, and LM.  You can use thisoption when cracking or with "--test".  Note that John can't crackhashes of different types at the same time.  If you happen to get apassword file which uses more than one hash type (for differentaccounts), then you have to invoke John once for each hash type andyou need to use this option to make John crack hashes of types otherthan the one it would autodetect by default.--save-memory=LEVEL		enable memory saving, at LEVEL 1..3You might need this option if you don't have enough memory or don'twant John to affect other processes too much.  Level 1 tells John tonot waste memory on login names; it is only supported when a crackingmode other than "single crack" is explicitly requested.  The onlyimpact is that you won't see the login names while cracking.  Highermemory saving levels have a performance impact; you should probablyavoid using them unless John doesn't work or gets into swap otherwise.	Additional utilities.There are some related utilities in John's run directory:	unshadow PASSWORD-FILE SHADOW-FILECombines the "passwd" and "shadow" files (when you already have accessto both) for use with John.  You might need this since if you onlyused your shadow file, the "Full Name" or "GECOS" information wouldn'tbe used by the "single crack" mode (thus reducing its efficiency) andyou wouldn't be able to use the "--groups" and "--shells" options andto select by UID with "--users".  You probably also want to see all ofthe passwd file fields with "--show".You'll usually want to redirect the output of "unshadow" to a filewhich you then pass to John.	unafs DATABASE-FILE CELL-NAMEGets password hashes out of the binary AFS database and producesoutput usable by John (you should redirect the output to a file).	unique OUTPUT-FILERemoves duplicates from a wordlist (read from stdin) without changingthe order of entries.  You might want to use this with John's"--stdout" option if you've got a lot of disk space to trade for thereduced cracking time (on possibly trying some duplicates as theymight be produced with word mangling rules).	mailer PASSWORD-FILEA shell script to send mail to all the users who got weak passwords.You should edit the message inside the script before using it.$Owl: Owl/packages/john/john/doc/OPTIONS,v 1.3 2005/11/16 13:11:15 solar Exp $

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -