John the ripper updated to v.

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

JPEG - 2.4 kb


  • Major performance improvements for processing of very large password files
    or sets of files, especially with salt-less or same-salt hashes, achieved
    primarily through introduction of two additional hash table sizes (64K and 1M
    entries), changes to the loader, and smarter processing of successful guesses
    (to accommodate getting thousands of hashes successfully cracked per second).
  • Many default buffer and hash table sizes have been increased and thresholds
    for the use of hash tables lowered, meaning that John will now tend to use
    more memory to achieve better speed (unless it is told not to with the
    "—save-memory" option).
  • Some previously missed common website passwords found on public lists of
    "top N passwords" have been added to the bundled common passwords list.
  • Some bugs introduced in 1.7.4 and affecting wordlist mode’s elimination of
    consecutive duplicate candidate passwords have been fixed.

Post scriptum


Related Articles

John the Ripper
Password Cracking