John the Ripper
Tool
Use of FILE2john
There are several scripts to convert any software format to john (keepass2john.py, zip2john.py, cisco2john.pl) located on john/run path. We use these scripts to create hash files that we can crack later with JTR.
#Example
python zip2john.py encrypted.zip > zip.hash
John parameters
-f=[format] / --format=[format]
-w=[wordlist path] / --wordlist=[wordlist path]
Attack examples
#Attack to md5 hash file
john -f=raw-md5 -w=/usr/share/wordlists/rockyou.txt md5.hash
#Attack to sha1 hash file
john -f=raw-sha1 -w=/usr/share/wordlists/rockyou.txt md5.hash
Last updated
Was this helpful?