<?xml version="1.0" encoding="utf-8"?>
<!-- generator="FeedCreator 1.7.2-ppt DokuWiki" -->
<?xml-stylesheet href="https://openwall.info/wiki/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://openwall.info/wiki/feed.php">
        <title>Openwall Community Wiki john:tutorials</title>
        <description></description>
        <link>https://openwall.info/wiki/</link>
        <image rdf:resource="https://openwall.info/wiki/lib/tpl/local/images/favicon.ico" />
       <dc:date>2026-04-27T20:24:52+02:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/tutorials/Ubuntu-build-howto?rev=1719940501&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/tutorials/add-codepage?rev=1352160890&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/tutorials/macosx-salted-sha1?rev=1268690451&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/tutorials/remote-linux?rev=1560624073&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/tutorials/sha-crypt?rev=1341275243&amp;do=diff"/>
                <rdf:li rdf:resource="https://openwall.info/wiki/john/tutorials/win64-howto-build?rev=1432444149&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://openwall.info/wiki/lib/tpl/local/images/favicon.ico">
        <title>Openwall Community Wiki</title>
        <link>https://openwall.info/wiki/</link>
        <url>https://openwall.info/wiki/lib/tpl/local/images/favicon.ico</url>
    </image>
    <item rdf:about="https://openwall.info/wiki/john/tutorials/Ubuntu-build-howto?rev=1719940501&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-07-02T19:15:01+02:00</dc:date>
        <title>How to build on Ubuntu Linux</title>
        <link>https://openwall.info/wiki/john/tutorials/Ubuntu-build-howto?rev=1719940501&amp;do=diff</link>
        <description>How to build on Ubuntu Linux

This wiki page is not currently maintained. Please refer to &lt;https://github.com/openwall/john/blob/bleeding-jumbo/doc/INSTALL-UBUNTU&gt; instead.

Here's how to make an optimal build of latest bleeding-edge code on Ubuntu Linux. Most of it applies to other distros too (also works for Ubuntu on Windows &lt;https://msdn.microsoft.com/en-us/commandline/wsl/&gt;).</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/tutorials/add-codepage?rev=1352160890&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-11-06T01:14:50+02:00</dc:date>
        <title>Procedure to add a new code-page to john</title>
        <link>https://openwall.info/wiki/john/tutorials/add-codepage?rev=1352160890&amp;do=diff</link>
        <description>This is for developers, or other advanced users.  So, you have a set of hashes, and they are in a code page for some language which John does not support.  Well, john 'can' have code pages added to it's support.  

The code pages I know work, are 8 bit (256 character), and left to right reading direction.  I do not know if other reading directions can be added. John does already have utf-8 support, but since this is a variable sized font/codepage, there are many things within john, which do not …</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/tutorials/macosx-salted-sha1?rev=1268690451&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2010-03-15T23:00:51+02:00</dc:date>
        <title>Cracking Mac OS X salted SHA-1 passwords</title>
        <link>https://openwall.info/wiki/john/tutorials/macosx-salted-sha1?rev=1268690451&amp;do=diff</link>
        <description>It is probably the simplest to use JtR Pro, which includes the XPWDUMP tool to dump the hashes and readily supports Mac OS X salted SHA-1 hashes.  You can use the Mac OS X native or the Linux version of JtR Pro (in case you prefer to audit your OS X hashes on a Linux box) - both of them support these hashes (although the XPWDUMP tool is only included with JtR Pro for Mac OS X).</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/tutorials/remote-linux?rev=1560624073&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2019-06-15T20:41:13+02:00</dc:date>
        <title>How to retrieve and audit password hashes from remote Linux servers</title>
        <link>https://openwall.info/wiki/john/tutorials/remote-linux?rev=1560624073&amp;do=diff</link>
        <description>The following instructions were originally written in response to a specific John the Ripper Pro support request.  Retrieving all of your servers' password hashes for audits on a single system and automating this setup (presumably to repeat the audits on a regular basis) is not always the right thing to do.  This poses a lot of extra risk to your servers' security.  You could want to opt to deploy pam_passwdqc and do “manual” audits with JtR infrequently instead.  On some systems, you may also s…</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/tutorials/sha-crypt?rev=1341275243&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2012-07-03T02:27:23+02:00</dc:date>
        <title>Cracking/auditing user passwords on recent Ubuntu, Fedora, and Solaris 10+ (SHA-crypt)</title>
        <link>https://openwall.info/wiki/john/tutorials/sha-crypt?rev=1341275243&amp;do=diff</link>
        <description>John the Ripper 1.7.6+

Detailed tutorials have been posted to the john-users list, separately for Linux (using Fedora 12 as the specific example) and for Solaris 10.  These include optional OpenMP parallelization instructions and examples (to use multiple CPUs and/or CPU cores).</description>
    </item>
    <item rdf:about="https://openwall.info/wiki/john/tutorials/win64-howto-build?rev=1432444149&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2015-05-24T07:09:09+02:00</dc:date>
        <title>How to build on/for Win64</title>
        <link>https://openwall.info/wiki/john/tutorials/win64-howto-build?rev=1432444149&amp;do=diff</link>
        <description>Simple directions for installing Cygwin64, pulling the more recent JtR version, and doing a Win64 build.

	*  Obtain the cygwin installer for 64 bits from &lt;http://cygwin.com/setup-x86_64.exe&gt;
	*  make a cygwin64 directory (I will default to c:\cygwin64)  Do not put ANY spaces into the path name (such as c:\program files\cygwin64).  c:\cygwin64 is recommended.
	*  place the setup-x86_64.exe into this folder, and run that executable.
	*  click Next.  Then Next again making sure that 'install from …</description>
    </item>
</rdf:RDF>
