Hi there --
I completed the installation of John the Ripper on one of our systems of which I am responsible. The purpose of the exercise, seriously, is to run checks on the user passwords, and check for their relative weakness.
I am planning on doing a run of the application, and so far what I have for the command syntax is the following:
Code:
john --wordlist=all.lst --rules --shells=tcsh,bash mypasswd > $HOME/john_results.txt
I have also changed the IDLE option in the configuration file to Y in order for the program to take up less CPU time.
Besides the steps that I have outlined above, is there anything else I should consider in doing before running the application? Thanks.