-   Linux - Software (
-   -   Using John the Ripper (

kaplan71 09-22-2009 05:57 PM

Using John the Ripper
Hi there --

I completed the installation of John the Ripper on one of our systems of which I am responsible. The purpose of the exercise, seriously, is to run checks on the user passwords, and check for their relative weakness.

I am planning on doing a run of the application, and so far what I have for the command syntax is the following:


john --wordlist=all.lst --rules --shells=tcsh,bash mypasswd > $HOME/john_results.txt
I have also changed the IDLE option in the configuration file to Y in order for the program to take up less CPU time.

Besides the steps that I have outlined above, is there anything else I should consider in doing before running the application? Thanks.

Disillusionist 09-23-2009 05:44 AM

It's been a while since I last ran "john" but your syntax looks fine to me.

Hopefully you won't find too many users with weak passwords.

Good luck.

All times are GMT -5. The time now is 01:30 PM.