Kali 2.0/John the Ripper
Started running into problems immediately, trying to dump generated passwords to stdout using John. Illegal inputs, or some baloney.
In any case, my workaround was to install a different John from the Kali 2.0 system John.
I downloaded John jumbo-1.8. There are lots of versions so make sure you get the latest jumbo.
$ unzip JohnTheRipper-jumbo-1.8.zip
Install OpenSSL Development Libs
Now install OpenSSL development headers before we install John the Ripper:
$ apt-get install libssl-dev
Configure and Make John
Now we can run configure and make:
$ ./configure $ make clean && make -s
Check out the before and after - the system john, and my john:
$ john -wordlist:/root/codes/john/rockyou10.lst -stdout Illegal instruction $ ./john -wordlist:/root/codes/john/rockyou10.lst -stdout | head -n 10 Press 'q' or Ctrl-C to abort, almost any other key for status 92p 0:00:00:00 100.00% (2015-08-18 21:22) 766.6p/s junior 123456 12345 123456789 password iloveyou princess 1234567 12345678 abc123 nicole
john the ripperpassword generator and all-around cracking tool.
Testing John: John the Ripper/Benchmarking
Using John on
Password generation using rules and modes: John the Ripper/Password Generation
Installing some useful password rules: John the Ripper/Rules
Using John to feed password guesses to Aircrack: Aircrack and John the Ripper
John the Ripper on AWS: Ubuntu/Barebones to JtR
Getting Passwords from John: John the Ripper/Password Recovery
Flags · Template:JohnFlag · e