<?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2-ppt DokuWiki" -->
<?xml-stylesheet href="https://openwall.info/wiki/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://openwall.info/wiki/feed.php">
        <title>Openwall Community Wiki john</title>
        <description></description>
        <link>https://openwall.info/wiki/</link>
        <image rdf:resource="https://openwall.info/wiki/lib/tpl/local/images/favicon.ico" />
       <dc:date>2026-05-15T08:41:13+02:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/Algorithms?rev=1409851056&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/Ettercap-JtR?rev=1360229269&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/FPGA?rev=1455923369&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/GPU-setup?rev=1340250151&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/GPU?rev=1639231376&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/GUI?rev=1313527498&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/Generating-test-hashes?rev=1364742292&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/JtR-valid-bugs?rev=1356872760&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/MD4?rev=1215830945&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/MSCash?rev=1267647432&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/MSCash2?rev=1308937954&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/MSCash2_simple_code?rev=1308937918&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/NTLM?rev=1266407699&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/OpenCL-BitCracker?rev=1487648752&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/OpenCL-BitLocker?rev=1731123323&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/OpenCL-CISCO4?rev=1363471105&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/OpenCL-RAWSHA-256?rev=1364567998&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/OpenCL-RAWSHA-512?rev=1364579167&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/OpenCL-SHA-256?rev=1360194281&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/OpenCL-SHA-512?rev=1360194149&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/OpenCL-XSHA-512?rev=1364579560&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/Using-john-to-crack-RADIUS-shared-secrets?rev=1487448819&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/WPA-PSK?rev=1560624602&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/articles-essays-case_studies?rev=1341693812&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/articles?rev=1375802534&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/benchmarks?rev=1762620447&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/cgminer_integration?rev=1379979174&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/contests?rev=1652207198&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/custom-builds?rev=1738715644&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/development?rev=1380351846&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/hash-formats?rev=1342895885&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/how-to-extract-tarballs-and-apply-patches?rev=1702656909&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/integrated-patches?rev=1341198171&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/joan?rev=1337095458&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/johnny-roadmap?rev=1459863046&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/johnny?rev=1598680411&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/jumbo-5-numbered-patches?rev=1316637701&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/licensing?rev=1427600872&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/mailing-list-excerpts?rev=1614802384&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/markov?rev=1269885838&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/mjohn?rev=1337283604&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/non-hashes?rev=1309466962&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/parallelization?rev=1392277902&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/patches?rev=1391122621&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/patches_old?rev=1324166863&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/policy?rev=1345800120&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/pp_PBKDF2?rev=1409851618&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/rules?rev=1357342860&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/rulesfinder?rev=1354299588&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/sample-hashes?rev=1560542835&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/sample-non-hashes?rev=1599742689&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/screenshots?rev=1555767128&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/test-suite?rev=1341108436&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/to-do-list-for-1.7.9-jumbo-8?rev=1413999002&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/tutorials?rev=1624017528&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/unsubscribe?rev=1432434506&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/usage-examples?rev=1351094379&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/wishlist?rev=1392942082&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://openwall.info/wiki/lib/tpl/local/images/favicon.ico">
        <title>Openwall Community Wiki</title>
        <link>https://openwall.info/wiki/</link>
        <url>https://openwall.info/wiki/lib/tpl/local/images/favicon.ico</url>
    </image>
    <item rdf:about="https://openwall.info/wiki/john/Algorithms?rev=1409851056&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-09-04T19:17:36+02:00</dc:date>
        <title>Some cryptographic algorithms explained</title>
        <link>https://openwall.info/wiki/john/Algorithms?rev=1409851056&amp;do=diff</link>
        <description>The following wiki pages were contributed by Alain Espinosa.  They're full of English grammar errors (Alain is obviously not a native English speaker) - please feel free to correct those.  The cryptographic algorithms being described are supported in “jumbo patches” for JtR.  Other than that, they're not specific to JtR.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/Ettercap-JtR?rev=1360229269&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-02-07T10:27:49+02:00</dc:date>
        <title>Extending Ettercap</title>
        <link>https://openwall.info/wiki/john/Ettercap-JtR?rev=1360229269&amp;do=diff</link>
        <description>Extending Ettercap is an alternative to designing and writing pcap2john program from scratch.

Ettercap's homepage is &lt;http://ettercap.sourceforge.net/&gt;

For general information about Ettercap, see &lt;http://en.wikipedia.org/wiki/Ettercap_&gt;(computing)

However, all development takes place on GitHub &lt;https://github.com/Ettercap/ettercap&gt;</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/FPGA?rev=1455923369&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-02-20T00:09:29+02:00</dc:date>
        <title>Implementation of bcrypt algorithm on FPGA</title>
        <link>https://openwall.info/wiki/john/FPGA?rev=1455923369&amp;do=diff</link>
        <description>We first approached this task as part of a GSoC 2011 project (but didn't achieve much), and then again as part of a GSoC 2013 project, continued beyond GSoC in 2014 (actually achieving decent speeds on Zynq 7020 on ZedBoard).</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/GPU-setup?rev=1340250151&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-06-21T05:42:31+02:00</dc:date>
        <title>GPU Setup</title>
        <link>https://openwall.info/wiki/john/GPU-setup?rev=1340250151&amp;do=diff</link>
        <description>This page should be a starting point to help you configure your GPU card for john the ripper under linux 

GPU Setup

As a side note, remember that under linux you have two kind of video card drivers:

	*  the open source / community one (named nouveau, radeon)
	*  the vendor / closed source one  (named nvidia, fglrx)</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/GPU?rev=1639231376&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-12-11T15:02:56+02:00</dc:date>
        <title>John the Ripper GPU support</title>
        <link>https://openwall.info/wiki/john/GPU?rev=1639231376&amp;do=diff</link>
        <description>The content of this wiki page went so out of date that it's been removed.

More up-to-date documentation can be found in the &quot;doc&quot; subdirectory in a JtR tree, and in particular in README-OPENCL and INSTALL* files.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/GUI?rev=1313527498&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2011-08-16T22:44:58+02:00</dc:date>
        <title>John the Ripper GUI sketches</title>
        <link>https://openwall.info/wiki/john/GUI?rev=1313527498&amp;do=diff</link>
        <description>Shinnok's proposal was chosen for development. See Johnny - GUI for John the Ripper for more details.

These are JtR GUI proposals for GSoC 2011, by different authors:

Shinnok

Johnny is a GUI concept to John the Ripper written in C++ using 
the Qt framework.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/Generating-test-hashes?rev=1364742292&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-03-31T17:04:52+02:00</dc:date>
        <title>How to produce test hashes for various formats</title>
        <link>https://openwall.info/wiki/john/Generating-test-hashes?rev=1364742292&amp;do=diff</link>
        <description>It's advisable to use a “user name” that is actually the password in clear text, or to place the password in the Gecos field. This way you can test --single mode as well as wordlist mode.

Note that the ”perl -ne” one-liners are also capable of taking a whole wordlist file to stdin!</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/JtR-valid-bugs?rev=1356872760&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-12-30T14:06:00+02:00</dc:date>
        <title>Formats with problems</title>
        <link>https://openwall.info/wiki/john/JtR-valid-bugs?rev=1356872760&amp;do=diff</link>
        <description>Here is a 'raw' list of input data, which causes formats to crash. This is by NO MEANS a full set. This is just a sample, which should allow developers to strengthen the validity checking (and prepare/split pre processing) within the formats.  NOTE, the issue may not effect all formats for a specific algorithm.  It may only affect the CPU, while the GPU code works properly, or may be the reverse. However for some formats, it affects ALL builds.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/MD4?rev=1215830945&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2008-07-12T04:49:05+02:00</dc:date>
        <title>MD4 Algorithm</title>
        <link>https://openwall.info/wiki/john/MD4?rev=1215830945&amp;do=diff</link>
        <description>MD4 Algorithm

Description

MD4 is an hash algorithm (the four in series) created by Ronald Rivest in MIT at 1990. The hash has a length of 128 bits. The algorithm has influenced posterior design like MD5, SHA family and RIPEMD.

Algorithm

Based on RFC 1320.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/MSCash?rev=1267647432&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-03-03T21:17:12+02:00</dc:date>
        <title>MSCash Algorithm</title>
        <link>https://openwall.info/wiki/john/MSCash?rev=1267647432&amp;do=diff</link>
        <description>MSCash Algorithm

Description

What happens when you are in front of a Windows machine, which has a domain account and you can't access the domain (due to network outage or domain server shutdown)? Microsoft solved this problem by saving the hash(es) of the last user(s) that logged into the local machine. These hashes are stored in the Windows registry,  by default the last 10 hashes.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/MSCash2?rev=1308937954&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2011-06-24T19:52:34+02:00</dc:date>
        <title>MSCash2 Algorithm</title>
        <link>https://openwall.info/wiki/john/MSCash2?rev=1308937954&amp;do=diff</link>
        <description>MSCash2 Algorithm

Description

Domain cached credentials (DCC) are cached domain logon information that are stored locally in the Windows registry of Windows operating systems (cf. MSCash Algorithm). With the release of the Windows Vista operating system, Microsoft introduced a new hash algorithm for generating these Domain Cached Credentials. This new algorithm increased the cost of password guessing attacks by several orders of magnitude.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/MSCash2_simple_code?rev=1308937918&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2011-06-24T19:51:58+02:00</dc:date>
        <title>MSCash2 code (simple)</title>
        <link>https://openwall.info/wiki/john/MSCash2_simple_code?rev=1308937918&amp;do=diff</link>
        <description>MSCash2 code (simple)


/*
 * dcc2_tst.c  A 'very' simple OpenSSL primative only test app, showing the
 * MSCASH2 format.   
 * Written June 24, 2011, Jim Fougeron.  Placed in public domain
 * This is a very slow, but easier to understand mscash2 hash computation program
 * It has been written 100% with oSSL primative functions (SHA1 and MD4).  It does
 * not use any hmac primatives.    This pbkdf2 'has' been reduced some, since we
 * know a 'little' info.  1. the key will always be smaller than…</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/NTLM?rev=1266407699&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-02-17T12:54:59+02:00</dc:date>
        <title>NTLM Algorithm</title>
        <link>https://openwall.info/wiki/john/NTLM?rev=1266407699&amp;do=diff</link>
        <description>NTLM Algorithm

Description

This is the format for save the passwords in modern Windows. The hash length are 128 bits and work for local account and Domain account (Active Directory account).

Algorithm

Parameter: Message which is the string to hash.

Output: Hash value which is a 128 bits value(4 integers of 32 bits).</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/OpenCL-BitCracker?rev=1487648752&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-02-21T04:45:52+02:00</dc:date>
        <title>OpenCL BitCracker</title>
        <link>https://openwall.info/wiki/john/OpenCL-BitCracker?rev=1487648752&amp;do=diff</link>
        <description>OpenCL BitCracker

Please refer to: &lt;http://openwall.info/wiki/john/OpenCL-BitLocker&gt;</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/OpenCL-BitLocker?rev=1731123323&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-11-09T04:35:23+02:00</dc:date>
        <title>OpenCL BitLocker</title>
        <link>https://openwall.info/wiki/john/OpenCL-BitLocker?rev=1731123323&amp;do=diff</link>
        <description>OpenCL BitLocker

BitLocker is a full-disk encryption feature available in recent Windows versions (Vista, 7, 8.1 and 10) Ultimate, Pro and Enterprise.

BitLocker-OpenCL format attacks memory units encrypted using the User Password  (see the following picture) or the Recovery Password authentication methods.

Our attack has been tested on several memory devices encrypted with BitLocker on Windows 7, 8.1 and 10 (both compatible and not compatible mode).

You can find the standalone CUDA implement…</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/OpenCL-CISCO4?rev=1363471105&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-03-16T22:58:25+02:00</dc:date>
        <title>Under development</title>
        <link>https://openwall.info/wiki/john/OpenCL-CISCO4?rev=1363471105&amp;do=diff</link>
        <description>Claudio</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/OpenCL-RAWSHA-256?rev=1364567998&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-03-29T15:39:58+02:00</dc:date>
        <title>OpenCL Raw SHA-256</title>
        <link>https://openwall.info/wiki/john/OpenCL-RAWSHA-256?rev=1364567998&amp;do=diff</link>
        <description>OpenCL Raw SHA-256

John can crack raw SHA-256 on OpenCL enabled devices. To use it, type: 

john –format=raw-sha256-opencl [other options]

All available GPU power is used while John is running, so the computer can become less responsive, especially if the GPU is used to control your monitor.

The hint is: if your computer seems to hang and you have only one GPU, your X Server is busy and you can't do anything. Just wait 5 or 10 minutes. If nothing happens, reboot your computer. I saw cases on …</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/OpenCL-RAWSHA-512?rev=1364579167&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-03-29T18:46:07+02:00</dc:date>
        <title>OpenCL Raw SHA-512</title>
        <link>https://openwall.info/wiki/john/OpenCL-RAWSHA-512?rev=1364579167&amp;do=diff</link>
        <description>OpenCL Raw SHA-512

John can crack raw SHA-512 on OpenCL enabled devices. To use it, type: 

john –format=raw-sha512-ng-opencl [other options]

All available GPU power is used while John is running, so the computer can become less responsive, especially if the GPU is used to control your monitor.

The hint is: if your computer seems to hang and you have only one GPU, your X Server is busy and you can't do anything. Just wait 5 or 10 minutes. If nothing happens, reboot your computer. I saw cases …</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/OpenCL-SHA-256?rev=1360194281&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-02-07T00:44:41+02:00</dc:date>
        <title>OpenCL SHA-256</title>
        <link>https://openwall.info/wiki/john/OpenCL-SHA-256?rev=1360194281&amp;do=diff</link>
        <description>OpenCL SHA-256

John can crack crypt SHA-256 on OpenCL enabled devices. To use it, type: 

john –format=sha256crypt-opencl [other options]

All available GPU power is used while John is running, so the computer can become less responsive, especially if the GPU is used to control your monitor.

The hint is: if your computer seems to hang and you have only one GPU, your X Server is busy and you can't do anything. Just wait 5 or 10 minutes. If nothing happens, reboot your computer. I saw cases on R…</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/OpenCL-SHA-512?rev=1360194149&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-02-07T00:42:29+02:00</dc:date>
        <title>OpenCL SHA-512</title>
        <link>https://openwall.info/wiki/john/OpenCL-SHA-512?rev=1360194149&amp;do=diff</link>
        <description>OpenCL SHA-512

John can crack crypt SHA-512 on OpenCL enabled devices. To use it, type: 

john –format=sha512crypt-opencl [other options]

All available GPU power is used while John is running, so the computer can become less responsive, especially if the GPU is used to control your monitor.

The hint is: if your computer seems to hang and you have only one GPU, your X Server is busy and you can't do anything. Just wait 5 or 10 minutes. If nothing happens, reboot your computer. I saw cases on R…</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/OpenCL-XSHA-512?rev=1364579560&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-03-29T18:52:40+02:00</dc:date>
        <title>OpenCL Mac OS X 10.7+ salted SHA-512</title>
        <link>https://openwall.info/wiki/john/OpenCL-XSHA-512?rev=1364579560&amp;do=diff</link>
        <description>OpenCL Mac OS X 10.7+ salted SHA-512

John can crack Mac OS X 10.7+ salted SHA-512 on OpenCL enabled devices. To use it, type: 

john –format=xsha512-ng-opencl [other options]

All available GPU power is used while John is running, so the computer can become less responsive, especially if the GPU is used to control your monitor.

The hint is: if your computer seems to hang and you have only one GPU, your X Server is busy and you can't do anything. Just wait 5 or 10 minutes. If nothing happens, r…</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/Using-john-to-crack-RADIUS-shared-secrets?rev=1487448819&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2017-02-18T21:13:39+02:00</dc:date>
        <title>Using John to crack RADIUS shared secrets</title>
        <link>https://openwall.info/wiki/john/Using-john-to-crack-RADIUS-shared-secrets?rev=1487448819&amp;do=diff</link>
        <description>The RADIUS protocol is using a shared secret between each client and the RADIUS server for two purposes: protecting user passwords and authentication of the RADIUS server replies. This is based on MD5 with a salt. 

The attached [perl script] is implementing two attacks as discussed in An Analysis of the RADIUS Authentication Protocol, by Joshua Hill.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/WPA-PSK?rev=1560624602&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-06-15T20:50:02+02:00</dc:date>
        <title>Cracking WPA-PSK/WPA2-PSK with John the Ripper</title>
        <link>https://openwall.info/wiki/john/WPA-PSK?rev=1560624602&amp;do=diff</link>
        <description>John is able to crack WPA-PSK and WPA2-PSK passwords.  Recent changes have improved performance when there are multiple hashes in the input file, that have the same SSID (the routers 'name' string). 

The input format is a printable hash, which can either be directly created with john's tool “wpapcap2john” (ships with jumbo) from a packet capture in pcap format as produced by tcpdump, wireshark or airodump-ng; or by doing an intermediate conversion to Hashcat's hccap format as described below.…</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/articles-essays-case_studies?rev=1341693812&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-07-07T22:43:32+02:00</dc:date>
        <title>Articles, Essays and Case Studies Submitted by John Users</title>
        <link>https://openwall.info/wiki/john/articles-essays-case_studies?rev=1341693812&amp;do=diff</link>
        <description>*  Differences Between Fast and Slow Hashes</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/articles?rev=1375802534&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-08-06T17:22:14+02:00</dc:date>
        <title>john:articles</title>
        <link>https://openwall.info/wiki/john/articles?rev=1375802534&amp;do=diff</link>
        <description>&lt;http://openwall.info/wiki/john/articles/EFS_Recovery&gt;</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/benchmarks?rev=1762620447&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-11-08T17:47:27+02:00</dc:date>
        <title>John the Ripper benchmarks</title>
        <link>https://openwall.info/wiki/john/benchmarks?rev=1762620447&amp;do=diff</link>
        <description>Initially, this page will be the place to collect and share trivial john --test benchmarks on different systems.  At a later time, it may make sense to turn it into a namespace with sub-pages for john --test benchmarks (only c/s rate matters) and actual cracking runs (lots of things matter).  Also, the underlying data may be uploaded/collected (e.g., exact john --test outputs, /proc/cpuinfo off of Linux systems, john.log files).</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/cgminer_integration?rev=1379979174&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-09-24T01:32:54+02:00</dc:date>
        <title>John the Ripper CGMiner Integration</title>
        <link>https://openwall.info/wiki/john/cgminer_integration?rev=1379979174&amp;do=diff</link>
        <description>John the Ripper can check if there are running a CGMiner instance and pause to mine in those GPUs that are going to be used in a cracking session. When John the Ripper ends, the paused GPUs will start again to mine.

Furthermore you can set John the Ripper to start a new CGMiner Instance when the cracking session ends if there are not any other CGMiner instance.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/contests?rev=1652207198&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-05-10T20:26:38+02:00</dc:date>
        <title>john-users team</title>
        <link>https://openwall.info/wiki/john/contests?rev=1652207198&amp;do=diff</link>
        <description>john-users team

Team “john-users” participates in hash cracking contests (aka password cracking contests). We are open to new members who would like to use FOSS hash cracking tools. See .

There is track of our participation in contests below. Team hashcat maintains similar table of achievements.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/custom-builds?rev=1738715644&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-02-05T01:34:04+02:00</dc:date>
        <title>Custom builds of John the Ripper</title>
        <link>https://openwall.info/wiki/john/custom-builds?rev=1738715644&amp;do=diff</link>
        <description>Listed below are user-contributed custom builds that have been uploaded directly to this wiki.  They have not been verified by the Openwall team in any way.  Please use them at your own risk.  For user-contributed custom builds that have been briefly looked at by Openwall file archive administrators, please refer to the contributed resources list on the JtR homepage and to per-OS subdirectories of the john/contrib/ directory in the file archive.  Nevertheless, your possible use of those is also …</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/development?rev=1380351846&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-09-28T09:04:06+02:00</dc:date>
        <title>JtR Development</title>
        <link>https://openwall.info/wiki/john/development?rev=1380351846&amp;do=diff</link>
        <description>This section contains information useful for those who might wish to understand the internals of JtR, or develop new functionality.

JtR compilation process explained

If you're new to JtR as I was, you might find yourself with nice clean compiles that run 'out of the box' (thanks to the design), but no idea what's really going on in the compilation process.
If you want to put the JtR code into an IDE like NetBeans to understand this software better by debugging it, you'll need to know more abou…</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/hash-formats?rev=1342895885&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-07-21T20:38:05+02:00</dc:date>
        <title>john:hash-formats</title>
        <link>https://openwall.info/wiki/john/hash-formats?rev=1342895885&amp;do=diff</link>
        <description>This page attempts to document the format(s) JtR is expecting for most hash types. There are several formats JtR can look for, these are some of the more typical:

	*  &lt;hash&gt;  When only the hash is present, JtR will output ”?” as the username when showing and or cracking.
	*  &lt;username&gt;:&lt;hash&gt;  (This is a basic/generic format)
	*  &lt;useruame&gt;:&lt;hash&gt;:&lt;uid&gt;:&lt;gid&gt;:&lt;GECOS&gt;:&lt;directory&gt;:&lt;shell&gt;  (This is a typical *nix “unshadowed” format)
	*  &lt;username&gt;:&lt;uid&gt;:&lt;LM-hash&gt;:&lt;NTLM-hash&gt;:&lt;comment&gt;:&lt;homedir&gt;:…</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/how-to-extract-tarballs-and-apply-patches?rev=1702656909&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-12-15T17:15:09+02:00</dc:date>
        <title>How to extract John the Ripper source code from tarballs</title>
        <link>https://openwall.info/wiki/john/how-to-extract-tarballs-and-apply-patches?rev=1702656909&amp;do=diff</link>
        <description>John the Ripper source code is distributed in the form of tarballs (tar archives) compressed with gzip, xz, or (for older versions) bzip2. On a Unix-like system with GNU tar (or on Cygwin if you use Windows), please use the following command for gzip-compressed tarballs:</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/integrated-patches?rev=1341198171&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-07-02T05:02:51+02:00</dc:date>
        <title>Patches that have since been integrated into the official JtR</title>
        <link>https://openwall.info/wiki/john/integrated-patches?rev=1341198171&amp;do=diff</link>
        <description>Patches that have since been integrated into the official JtR
 Patch  Author  Status and Description  Parallelization of bitslice DES with OpenMP, revision 1.7.8-omp-des-7  Solar Designer  Status: separate patch, currently relevant. 
This is a quick and really dirty yet successful attempt at parallelizing JtR's bitslice DES code with OpenMP directives (requires gcc 4.2+ or the like). Currently unconditionally uses SSE2 intrinsics. Provides good performance for traditional DES-based crypt(3) hash…</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/joan?rev=1337095458&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-05-15T17:24:18+02:00</dc:date>
        <title>Joan the Helper for John the Ripper</title>
        <link>https://openwall.info/wiki/john/joan?rev=1337095458&amp;do=diff</link>
        <description>Now it is renamed into MJohn - collaboration tool for John the Ripper.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/johnny-roadmap?rev=1459863046&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2016-04-05T15:30:46+02:00</dc:date>
        <title>Johnny development roadmap</title>
        <link>https://openwall.info/wiki/john/johnny-roadmap?rev=1459863046&amp;do=diff</link>
        <description>As of 26.03.2015 the latest version for Johnny is 1.1. The current document aims to roadmap the feature development and improvement from this version onwards. The actual tasks are split into milestone sprints. The release scheme and versioning may differ.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/johnny?rev=1598680411&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-08-29T07:53:31+02:00</dc:date>
        <title>Johnny - GUI for John the Ripper</title>
        <link>https://openwall.info/wiki/john/johnny?rev=1598680411&amp;do=diff</link>
        <description>Description

Johnny is the cross-platform Open Source GUI frontend for the popular password cracker John the Ripper. It was originally proposed and designed by Shinnok in draft, version 1.0 implementation was achieved by Aleksey Cherepanov as part of GSoC 2012 and Mathieu Laprise took Johnny further towards 2.0 and beyond as part of GSoC 2015.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/jumbo-5-numbered-patches?rev=1316637701&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2011-09-21T22:41:41+02:00</dc:date>
        <title>Numbered patches from 1.7.8-Jumbo-5 to 1.7.8-Jumbo-7</title>
        <link>https://openwall.info/wiki/john/jumbo-5-numbered-patches?rev=1316637701&amp;do=diff</link>
        <description>Numbered patches from 1.7.8-Jumbo-5 to 1.7.8-Jumbo-7
 Patch  Author  Status and Description    JimF  Patch for BE systems and sybasease    JimF  Patch for Solaris.  I am not 100% sure about this one.  It would be nice to have someone validate this is needed, or at least that the LDFLAGS does not cause any problems    magnum  This has got to be the most trivial patch ever.    JimF  Fixed worse behavior in prior md5-gen-29 patch.  Init is done each time at startup, but we use a static variable in …</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/licensing?rev=1427600872&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2015-03-29T05:47:52+02:00</dc:date>
        <title>John the Ripper licensing</title>
        <link>https://openwall.info/wiki/john/licensing?rev=1427600872&amp;do=diff</link>
        <description>John the Ripper is released under GNU GPL v2 &quot;or later&quot;, with portions also available under more relaxed terms.  John the Ripper Pro is released under a commercial license.

Solar Designer's current preference is that new code contributions be licensed under very liberal terms:</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/mailing-list-excerpts?rev=1614802384&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-03-03T21:13:04+02:00</dc:date>
        <title>Most useful and currently relevant excerpts from john-users mailing list</title>
        <link>https://openwall.info/wiki/john/mailing-list-excerpts?rev=1614802384&amp;do=diff</link>
        <description>The subscription instructions for the john-users mailing list and links to full archives are available on the JtR homepage.  The unsubscription instructions are available on this wiki.

The following are links to some selected postings:

	*  Reusing mining GPU rigs (2021/03/03)
	*  Generating multiple masks and dynamically distributing them across devices (2021/03/03)
	*  Does PCIe bandwidth matter? (2020/02/29)
	*  (On-device) mask and hybrid mode examples (2019/03/25)
	*  Cracking DES-based cr…</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/markov?rev=1269885838&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-03-29T20:03:58+02:00</dc:date>
        <title>Markov generator</title>
        <link>https://openwall.info/wiki/john/markov?rev=1269885838&amp;do=diff</link>
        <description>The assumption behind this theory is that people can remember their passwords because there is a hidden Markov model in the way they are generated. This paper was the source of inspiration for this patch. The basic hypothesis is that the probability that a letter appears at position n is a function of the letter at position (n-1) . This models the fact that it is more likely to find after a c the letter h than the letter z.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/mjohn?rev=1337283604&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-05-17T21:40:04+02:00</dc:date>
        <title>MJohn - collaboration tool for John the Ripper</title>
        <link>https://openwall.info/wiki/john/mjohn?rev=1337283604&amp;do=diff</link>
        <description>MJohn stands for Multi-/Massive-/Mega-/Meta- John the Ripper.

(At the beginning it was known as automation equipped working place of
a hash cracker and as Joan the Helper for John the Ripper.)

Description

MJohn is a set of helpers for John the Ripper to support collaborative
audits. It is not yet implemented. Below you will find proposal for
the task with timeline for summer. Currently as proposed by Aleksey
Cherepanov.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/non-hashes?rev=1309466962&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2011-06-30T22:49:22+02:00</dc:date>
        <title>Adding support for more non-hashes to JtR</title>
        <link>https://openwall.info/wiki/john/non-hashes?rev=1309466962&amp;do=diff</link>
        <description>Unless you're developing or debugging JtR program code, you're probably looking for the sample non-hashes page instead of this one.

Dhiru Kholia's assorted notes

Notes

1. Read the manual pages!

How to trace and understand existing code

1. Build debug versions of the package</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/parallelization?rev=1392277902&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-02-13T08:51:42+02:00</dc:date>
        <title>Parallel and distributed processing with John the Ripper</title>
        <link>https://openwall.info/wiki/john/parallelization?rev=1392277902&amp;do=diff</link>
        <description>One of the most common questions in the computing domain is “Can I use multiple processes or cores to increase speed?”  In particular, problems that are time-sensitive or would take a relatively unreasonable amount of time to solve (NP-complete) receive a lot of attention; password cracking is no different.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/patches?rev=1391122621&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-01-30T23:57:01+02:00</dc:date>
        <title>Contributed patches for John the Ripper</title>
        <link>https://openwall.info/wiki/john/patches?rev=1391122621&amp;do=diff</link>
        <description>This is the page and DokuWiki namespace to upload unofficial JtR patches to (yes, the wiki supports file uploads - just click the icon showing a picture frame while editing the page).  Please do.  Links to external websites with JtR patches are also acceptable.  Significant updates to this wiki page (such as newly added patches) are to be announced on the john-users mailing list (in addition to updating the wiki page, not instead of that).</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/patches_old?rev=1324166863&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2011-12-18T01:07:43+02:00</dc:date>
        <title>!!!OLD!!! Contributed patches for John the Ripper</title>
        <link>https://openwall.info/wiki/john/patches_old?rev=1324166863&amp;do=diff</link>
        <description>Incrementals for 1.7.9 Jumbo-4
 Patch  Author  Status and Description    magnum  Ensures that external mode truncates candidates to format's max length.    magnum  If patch 0001 is accepted, we can drop some checks in very fast formats for a boost, like NT (NT2 already lacked them). The patch also makes the UTF-8 length checks (which are still needed) in NT and NT2 faster (and accurate))    magnum  Replicates the jumbo-4 changes in x86-ssei.h to x86-ssei.h    magnum  More granularity (different …</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/policy?rev=1345800120&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-08-24T11:22:00+02:00</dc:date>
        <title>Effect of password policies on keyspace reduction</title>
        <link>https://openwall.info/wiki/john/policy?rev=1345800120&amp;do=diff</link>
        <description>The tables below show just how password policies that require either at least N character classes or at least N characters of each class affect the total keyspace for each length.

Once in a while, someone posts to john-users asking how to restrict John the Ripper to match a policy, hoping that this would substantially reduce the number of candidate passwords to try.  Most of the time, such assumptions are incorrect, although in some extreme cases they are valid.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/pp_PBKDF2?rev=1409851618&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-09-04T19:26:58+02:00</dc:date>
        <title>john:pp_PBKDF2</title>
        <link>https://openwall.info/wiki/john/pp_PBKDF2?rev=1409851618&amp;do=diff</link>
        <description>Here is a very simple Perl script that does PBKDF2-HMAC-* functions.  These functions (hmac_pad, pp_pbkdf2 and pp_pbkdf2_hex) have been incorporated into the pass_gen.pl script in JtR main runtime (bleeding edge).  I simply put these functions here to publish them for anyone to be able to find, and to be indexed into search engines.  This code is pretty flexible, allowing the 'flawed' (IMHO) HMAC function with about any crypto algorithm to be used in the PBKDF2 key stretching function.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/rules?rev=1357342860&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2013-01-05T00:41:00+02:00</dc:date>
        <title>Wordlist mode rulesets for use with John the Ripper</title>
        <link>https://openwall.info/wiki/john/rules?rev=1357342860&amp;do=diff</link>
        <description>These are some rulesets that you may put into your john.conf file and invoke with --rules=NAME (specifying the section NAME) on the command-line (this option syntax requires the jumbo patch).

KoreLogic-derived

	*  [KoreLogic's original rules] as released right after the DEFCON 2010 contest.  This file was downloaded from &lt;http://contest-2010.korelogic.com/rules.html&gt; and it was originally called simply rules.txt.
	*  [A revision of the above combining all sections into a single KoreLogicRules …</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/rulesfinder?rev=1354299588&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-11-30T19:19:48+02:00</dc:date>
        <title>john:rulesfinder</title>
        <link>https://openwall.info/wiki/john/rulesfinder?rev=1354299588&amp;do=diff</link>
        <description>Placeholder for the project page. The project is currently found on Github.

A related project, the manglingrules library, can also be found on Github.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/sample-hashes?rev=1560542835&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-06-14T22:07:15+02:00</dc:date>
        <title>Sample password hash encoding strings</title>
        <link>https://openwall.info/wiki/john/sample-hashes?rev=1560542835&amp;do=diff</link>
        <description>This wiki page is meant to be populated with sample password hash encoding strings and the corresponding plaintext passwords, as well as with info on the hash types.  Relevant file formats (such as /etc/passwd, PWDUMP output, Cisco IOS config files, etc.) may also be mentioned.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/sample-non-hashes?rev=1599742689&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-09-10T14:58:09+02:00</dc:date>
        <title>Sample non-hashes (to be) supported by JtR</title>
        <link>https://openwall.info/wiki/john/sample-non-hashes?rev=1599742689&amp;do=diff</link>
        <description>NOTE: We now have a repo &lt;https://github.com/openwall/john-samples&gt; with all data from here.

JtR-jumbo supports way many more hashes (or non-hashes) than that are listed on this page.

1Password &quot;Agile Keychain&quot;

Supported in JtR 1.7.9-jumbo-8 and above.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/screenshots?rev=1555767128&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-04-20T15:32:08+02:00</dc:date>
        <title>john:screenshots</title>
        <link>https://openwall.info/wiki/john/screenshots?rev=1555767128&amp;do=diff</link>
        <description>*  &lt;https://openwall.info/wiki/_media/john/build-info.png&gt;

	*  &lt;https://openwall.info/wiki/_media/john/help.png&gt;</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/test-suite?rev=1341108436&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-07-01T04:07:16+02:00</dc:date>
        <title>John the ripper Test Suite</title>
        <link>https://openwall.info/wiki/john/test-suite?rev=1341108436&amp;do=diff</link>
        <description>This page is still WIP.  JimF.   

Test Suite Intro

So, you have john built, or have added a new great format to john.  Well, does it work?  How can you tell.   There is a self-test mode built into john, that helps to detect the worst of the worst errors.  However, there can be problems which DO slip by the self test.   This is where the 'John-Test-Suite' has come into play.</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/to-do-list-for-1.7.9-jumbo-8?rev=1413999002&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-10-22T19:30:02+02:00</dc:date>
        <title>Things in unstable-jumbo needing to be fixed before release of 1.7.9-jumbo-8</title>
        <link>https://openwall.info/wiki/john/to-do-list-for-1.7.9-jumbo-8?rev=1413999002&amp;do=diff</link>
        <description>This is moved to GitHub 'issues':

&lt;https://github.com/magnumripper/JohnTheRipper/issues?q=label%3Aunstable-jumbo&gt;

&lt;https://github.com/magnumripper/JohnTheRipper/issues&gt;</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/tutorials?rev=1624017528&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-06-18T13:58:48+02:00</dc:date>
        <title>John the Ripper step-by-step tutorials for end-users</title>
        <link>https://openwall.info/wiki/john/tutorials?rev=1624017528&amp;do=diff</link>
        <description>Tutorials maintained on this wiki:

	*  How to build on Ubuntu Linux (basic to intermediate)
	*  How to build on/for Win64 (basic to intermediate)
	*  Cracking/auditing user passwords on recent Ubuntu, Fedora, and some Solaris 10+ (SHA-crypt) (basic to intermediate)
	*  How to retrieve and audit password hashes from remote Linux servers (intermediate)
	*  Cracking WPA-PSK/WPA2-PSK with John the Ripper (intermediate)
	*  Procedure to add a new code-page to john (advanced development - should move…</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/unsubscribe?rev=1432434506&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2015-05-24T04:28:26+02:00</dc:date>
        <title>How to unsubscribe from the john-users mailing list</title>
        <link>https://openwall.info/wiki/john/unsubscribe?rev=1432434506&amp;do=diff</link>
        <description>If you ever wish to unsubscribe from the john-users mailing list, you may do so by sending any message (empty will do) from your subscribed address to &lt;john-users-unsubscribe@lists.openwall.com&gt; and then “replying” to the automated confirmation request (this is needed to prevent someone else from unsubscribing you).</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/usage-examples?rev=1351094379&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-10-24T17:59:39+02:00</dc:date>
        <title>John the Ripper advanced usage examples and compile-time hacks</title>
        <link>https://openwall.info/wiki/john/usage-examples?rev=1351094379&amp;do=diff</link>
        <description>Usage examples

First of all, you ought to have a look at the examples included in the official documentation for JtR.  This wiki page is for additional usage examples, hopefully more advanced ones.

	*  How to instantly crack NTLM hashes (case-sensitive) given cracked LM ones (2006/07/08)
	*  Ditto by @mubix and more up-to-date (2012/10/24)</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/wishlist?rev=1392942082&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-02-21T01:21:22+02:00</dc:date>
        <title>Wish-list for JtR</title>
        <link>https://openwall.info/wiki/john/wishlist?rev=1392942082&amp;do=diff</link>
        <description>THIS PAGE IS DEPRECATED. Use &lt;https://github.com/magnumripper/JohnTheRipper/issues&gt; instead.

Add stuff that you think would enhance JtR to this list. Also consider writing to the mailing list about the details and link to that in here.

If you start working on one of the items, add a note on it, listing who is doing the work, i.e. (in progress, magnum)</description>
    </item>
</rdf:RDF>
