john
TLDR
Crack password file
$ john [hashes.txt]
Show cracked passwords$ john --show [hashes.txt]
Use specific wordlist$ john --wordlist=[wordlist.txt] [hashes.txt]
Specify hash format$ john --format=[md5crypt] [hashes.txt]
Incremental mode$ john --incremental [hashes.txt]
Resume cracking session$ john --restore
SYNOPSIS
john [options] [passwordfiles_]
DESCRIPTION
john is John the Ripper, a password security auditing tool. It detects weak passwords through various cracking methods.
The tool supports many hash formats and attack modes. It's used for security testing and password audits.
john audits password security.
PARAMETERS
PASSWORDFILES_
Files containing hashes.--show
Show cracked passwords.--wordlist FILE
Use wordlist attack.--format FORMAT
Hash format (md5crypt, sha256, etc.).--incremental
Brute force mode.--restore
Resume previous session.--help
Display help information.
CAVEATS
Authorized use only. CPU/GPU intensive. Jumbo version has more formats.
HISTORY
John the Ripper was created by Solar Designer in 1996 and is maintained by Openwall as an open-source password auditing tool.


