Talk:John the Ripper
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||
|
Jack
[edit]I may be wrong, but I seem to recall that "jack" (the tool) was called "cracker jack" and not "jack the cracker".
That is correct - Cracker Jack was called <! -- Template:Unsigned IP -->— Preceding unsigned comment added by 83.60.131.212 (talk) 13:56, 28 May 2017 (UTC) <! --Auto signed by Sine Bot-->
Safety
[edit]Is this a safe program to install on the computer?
John the Ripper is a perfectly safe program to install and run, as most popular UNIX tools. If you are running a multi-user system, you should make sure you are shadowing your password file such that the hashes are not visible; however even if you are not, not installing John will not prevent a malicious user from running John on their own computer with your hashes. 24.29.130.37 07:49, 18 January 2006 (UTC)
Def. of "canned"
[edit]What does the word 'canned' mean in the last paragraph? I'm an old dude, and ain't hip to the lingo. Two Halves
Huh?
[edit]Except for modern Intel CPUs, the modern AMD CPUs (like Opterons or other AMD64-CPUs) do provide 16 SSE2-Registers, but only in the 64-bit mode (only in 32-bit mode).
I'm confused.. What is being said here? "Except for ..." would exclude "Intel CPUs" from the set "modern AMD CPUs," but "intel CPUs" are not "modern AMD CPUs," so why are they an exception? I think that should be "Unlike modern Intel CPUs," but I don't know enough about the subject to know if that is correct either...
Jack the Cracker
[edit]I removed these two paragraphs from the article:
- The name "John the ripper" was coined by Lost Soul, a cracker from UNITED_cRACKING_fORCE, who coined this name after Jack the cracker (The password cracker that preceded John the ripper) -NOTE: The program was called "Cracker Jack", not Jack the cracker.
Lost soul thought that the previous password cracker wasn't named properly and wanted to 'fix' this mistake by making John 'the ripper', the way Jack should've been in the first place...
- Also, John the ripper sounded as a good alternative for jack the cracker ("Cracker Jack"), eventually it took Jack's place.
(Note that the later paragraph was added by Lost Soul, himself).
They have no sources, and being "added by Lost Soul, himself" does not count. - furrykef (Talk at me) 22:09, 7 April 2007 (UTC)
- It is not correct. First, the program was a DOS utility called "Cracker Jack." Second, it was Solar Designer who wrote and named John the Ripper. -- Kainaw(what?) 03:05, 10 July 2007 (UTC)
--> Agree!
Thanks for the Virus!
[edit]I clicked on the download anchor for the free version and my anti-virus software lit up like a Christmas tree. I received a two file payload that I ended up having to manually delete!
What the Hey?
HH 7/30/2007
- You're very welcome. User:Jchillerup 85.235.228.56 09:17, 20 August 2007 (UTC)
Safety again
[edit]Firstly, I've put names to the separate sections of this article. Secondly, I'd like to ask about the safety of this John the Ripper, an issue that must be addressed; it appears to be misleading, and by it I refer to the article, for starters. Could someone with expert knowledge address this immediately, please?
Thanks very much,c u 2night.
Also, please sign your messages with four tildes (~~~~). Thank you. Qwerty (talk) 14:29, 13 October 2007 (UTC)
- Safety? Well, what about it? John the Ripper is just a normal program — it has the same privileges as the user running it. Under Unix systems, regular users cannot read the shadow file (the file storing encrypted passwords; all modern Unixes use shadow passwords). But if a user does somehow gain access to other users' encrypted passwords, they can simply copy it on another system and crack it there. Or they could install the program under their own home directory.
- In other words, installing or removing the program does not affect an attacker's capability in any way. -- intgr [talk] 16:46, 13 October 2007 (UTC)
alright that maybe a good program to use... —Preceding unsigned comment added by 92.62.160.6 (talk) 05:55, 13 November 2010 (UTC)
History
[edit]There is a lot of info on the website that could be added to make a history section. This could include version releases and development info. Aehinson (talk) 15:09, 1 February 2013 (UTC)
Attack types
[edit]I fleshed this out a bit more now, but I'm not confident in my explaination of "single crack" mode. Might be nice to expand on the Markov method based on the paper linked Maattfr (talk) 22:07, 30 October 2024 (UTC)
- Start-Class Computer Security articles
- Low-importance Computer Security articles
- Start-Class Computer Security articles of Low-importance
- Start-Class Computing articles
- Low-importance Computing articles
- All Computing articles
- All Computer Security articles
- Start-Class software articles
- Low-importance software articles
- Start-Class software articles of Low-importance
- All Software articles
- Start-Class Free and open-source software articles
- Low-importance Free and open-source software articles
- Start-Class Free and open-source software articles of Low-importance
- All Free and open-source software articles