mb720 / john-samples

A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools

Home Page:https://openwall.info/wiki/john/sample-non-hashes

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

This repository contains all files from https://openwall.info/wiki/john/sample-non-hashes unpacked and somewhat cleaned up.

Normally, the password to crack a sample is included in the file name (e.g. zip1_testpassword#.zip has a password of testpassword#) or in a file near it, such as password.txt which can be used directly as a wordlist.

If all else fails, try really simple passwords including openwall and hashcat. Or if you're lucky, the latest John Jumbo has the sample as a test vector. To dump all such test vectors' passwords to a wordlist, try this:

./john --format=cpu --list=format-tests | cut -f4 | ./unique all_tests.lst

About

A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools

https://openwall.info/wiki/john/sample-non-hashes


Languages

Language:HTML 94.3%Language:Shell 5.2%Language:Python 0.5%Language:Makefile 0.1%Language:Standard ML 0.0%Language:JavaScript 0.0%