John the Ripper Cheatsheet
John the Ripper Cheatsheet
Getting Started
Install John the Ripper:
Basic Syntax:
Basic Commands
Crack a Password File:
Generating Hashes
Generate MD5 Hash:
Wordlist Mode
Using a Wordlist:
Enable Rules:
Incremental Mode
Default Incremental Mode:
Mask Attack
Simple Mask Example:
Complex Mask:
Hybrid Attack
Combining Mask and Wordlist:
Session Management
Save Session:
Restore Session:
`john --restore=[session_name]`
Useful Options
List Available Hash Formats:
`john --list=formats`
Verbose Output:
Adjust Performance:
`john --fork=4 hashfile` (Runs 4 parallel processes).
|---------------------|--------------|
| MD5 | raw-md5 |
| SHA-1 | raw-sha1 |
| NTLM | nt |
| bcrypt | bcrypt |
| SHA256crypt | sha256crypt |
| SHA512crypt | sha512crypt |
Example Workflows
Crack NTLM Hash with Wordlist:
`john --restore`
Post-Crack Analysis
Analyze Cracked Passwords:
Compare Performance:
`john --test`