⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 faq

📁 UNIX、linux密码的破密程序源代码实现
💻
字号:
	John the Ripper FAQ.The latest version of this FAQ may be viewed online at:	http://www.openwall.com/john/doc/FAQ.shtml	Help!  I can't run John.If you're not familiar with your OS, you should probably not be usingJohn in the first place since John is a tool for system administrators.However, here are the answers to a few (not very) common questions toavoid having them asked over and over and for amusement.Q: When I type "john" (or "john passwd", etc.), it says "command notfound" (or equivalent)?!A: The examples given in John the Ripper documentation assume that youknow how to invoke newly-built programs from your shell.  On Unix-likesystems, it is typical to not have "." (the current directory) in your$PATH (the list of directories to search for programs).  In that case,you need to type "./john" (dot, slash, and "john", without the quotes)to invoke the John binary executable located in the current directory.Q: ...but I am on a Unix-like system and I don't seem to readily have aJohn binary executable.A: Please follow the instructions in INSTALL.Q: When I double-click on "john.exe", a window flashes and disappears?!A: You're not supposed to click.  You're supposed to run John from acommand-line shell.  On Windows, some of those shells would be cmd.exe,command.com, or bash (the latter is available with Cygwin).	Other trivial matters.Q: How do I start John on my password file, use a specific crackingmode, see the passwords it cracked, etc?A: See README and EXAMPLES. :-)Q: How do I "unshadow"?A: See EXAMPLES on how to combine your passwd and shadow files.  If youdon't have root access, there's no answer for you here. :-)Q: Why doesn't John load my password file?  It says "No password hashesloaded".A: Your password file might be shadowed.  You need to get both/etc/passwd and the shadow file, and combine them into one file for usewith John.  Please refer to EXAMPLES.  As the system administrator,you're supposed to know the name and location of your shadow file.A: All of the password hashes found in the file (that John recognizes assuch) might be already cracked by previous invocations of John.A: The file you're trying to run John on might in fact not be a passwordfile at all.A: Your command line syntax might be wrong, resulting in John trying toload a wrong file.A: Your password file format or hash type(s) might not be supported byJohn, or at least by the version and build of John that you're using.If you're positive that this is the case, you may want to check thecontributed resources list on John the Ripper homepage for a suitablepatch and, if unsuccessful with that, post a note to the mailing list(see CREDITS) including a sample password file line that John does notload (please make sure that the password is already changed by the timeyou post).Q: I am getting the error "fopen: ./all.chr: No such file or directory"(or "fopen: ./lanman.chr: No such file or directory").Q: Where are the charset files?A: Development versions of John the Ripper might not include the charsetfiles.  You're supposed to take them out of the latest official release.Q: Where do I get wordlists for use with John?A: http://www.openwall.com/wordlists/Q: Where do I get new versions of John the Ripper?Q: Where do I get the source code for John?Q: I only have the source code for John the Ripper, where do I get itpre-compiled for Windows (or another supported non-Unix OS)?Q: What is the primary website for John the Ripper?A: http://www.openwall.com/john/Q: How can I contact you (the author)?A: See CREDITS.	(Semi-)advanced topics.Q: I've recently switched my system to MD5-based (or Blowfish-based)password hashes, but there are still some DES-based hashes in thepassword file.  How do I handle multiple hash types in one file?A: Use the "--format=..." option to tell John which hashes you wouldlike it to load.  Unfortunately, you will have to run John for each hashtype separately.  See OPTIONS.Q: I have 10 users, but John said it loaded 15 password hashes.  What'sgoing on?A: Some extremely poorly designed hash types (Windows NT LM hashes anddouble-length DES-based crypt(3) hashes also known as "bigcrypt" or"crypt16") have a property that allows John to split their encodingsinto two separate hashes (corresponding to halves of plaintextpasswords) on load.  John then proceeds to crack those hashesseparately, so at a given time it might have only one of two halves ofsome passwords cracked.  If interrupted and restarted, it would need toonly load the hashes which correspond to uncracked password halves, sothe number of such hashes is what John reports (in all cases, forconsistency).Q: Why doesn't John display a progress indicator for the "incremental"mode?A: Do you really want to see a 0% all the time?  As explained in MODES,"incremental" mode is not supposed to terminate in a reasonable time.(There are a few exceptions to this, so a progress indicator might beadded at some point.)Q: Why does John display meaningless c/s values while cracking, insteadof real "crypts per second" rate?A: The values displayed by John mean combinations (of username andpassword) per second, not crypts per second.  This is the effectivecracking speed that you get on a particular set of password hashes, andit may be useful, for example, to tune the "--salts=..." threshold andother settings.  If you want a benchmark of the low-level passwordhashing routines only, use "--test".  (Future versions of John theRipper might report effective and raw c/s rates for different timeintervals.  These won't fit on the current status line, though.)Q: I just noticed that the c/s rate reported while using "incremental"mode is a lot lower than it is with other cracking modes.  Why?A: You're probably running John for a few seconds only.  The current"incremental" mode implementation uses large character sets which needto be expanded into even larger data structures in memory each time Johnswitches to a different password length.  Fortunately, this is onlynoticeable when John has just started since the length switches becomerare after a few minutes.  For long-living sessions, which is where wecare about performance the most, this overhead is negligible.  This is avery low price for the better order of candidate passwords tried.Q: How can I test John's password hashing routines for proper operation?A: John always performs a self-test when you run it on a password fileand refuses to work if an error occurs.  If you need to test all of thelow-level routines at once, use "--test".Q: Does John support multi-processing or distributed processing?A: There's no real MP or distributed processing support in John rightnow, but you can distribute the work between a few nodes manually.  Oneapproach would be to have your nodes (CPUs, machines) each try differentpassword lengths.  This is easily accomplished with "incremental" mode's"MinLen" and "MaxLen" settings (see CONFIG).  Typically, you would notreally need to split the work for "single crack" and wordlist modessince these are relatively quick, although you may dedicate one node tothose initially.  You may safely run multiple instances of John in thesame working directory, all writing to the same "pot file" (this is afeature).  You do, however, need to assign each of them a unique sessionname, with "--session".  Other approaches, such as splitting passwordfiles naively (without regard to salts), are typically less efficient(in some cases to the extent where there's no speedup from usingmultiple processors at all).	Miscellaneous.Q: Is John the Ripper better than Crack?A: I think so, but I am biased.  John is much faster, has many passwordhash types supported out of the box and even more with contributedpatches, has "incremental" mode (try all possible candidate passwords inorder of decreasing estimated probability) and other features not foundin Crack, and is natively available on more platforms.  However, onefeature that is currently unique to Crack is its DAWG (Directed AcyclicWord Graphs) wordlist compression, which saves disk space needed tostore wordlists.Q: Is John the Ripper better than L0phtCrack?A: In some aspects, yes (but I am biased).  John runs on many platforms.For example, you can have it crack Windows passwords while running onLinux or Mac OS X on PowerPC (and it will take advantage of AltiVecacceleration there!)  L0phtCrack only runs on Windows.  John'sperformance at Windows NT LM hashes (case-insensitive, DES-based) iscomparable to that of recent versions of L0phtCrack (LC 5 as of thiswriting), but John offers "incremental" mode (see the answer to theprevious question) which lets it outperform L0phtCrack at LM hashes insome cases.  John is also better at Unix passwords.  L0phtCrack, on theother hand, is specialized for Windows passwords and includes manyWindows-specific features that John does not.  Finally, L0phtCrack is apurely commercial Windows GUI application.$Owl: Owl/packages/john/john/doc/FAQ,v 1.9 2005/11/16 13:11:15 solar Exp $

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -