aboutsummaryrefslogtreecommitdiff
path: root/system/john/README
diff options
context:
space:
mode:
authorMurat D. Kadirov <banderols@gmail.com>2010-05-11 22:55:19 +0200
committerDavid Somero <xgizzmo@slackbuilds.org>2010-05-11 22:55:19 +0200
commit4ccbcd7957f264b46d9550bc0a6912b1990bc8d7 (patch)
tree690c5b17da6dd01405bd823968126b3160664f97 /system/john/README
parent9690d1dba9d24ec29728d5473da4d2b69af4a17e (diff)
system/john: Added to 12.1 repository
Diffstat (limited to 'system/john/README')
-rw-r--r--system/john/README22
1 files changed, 22 insertions, 0 deletions
diff --git a/system/john/README b/system/john/README
new file mode 100644
index 0000000000000..01863b67ca79b
--- /dev/null
+++ b/system/john/README
@@ -0,0 +1,22 @@
+John the Ripper is a fast password cracker, currently available for many
+flavors of Unix (11 are officially supported, not counting different
+architectures), Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to
+detect weak Unix passwords. Besides several crypt(3) password hash types
+most commonly found on various Unix flavors, supported out of the box are
+Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with
+contributed patches.
+
+SlackBuild contain updated version of Ryan Lim's patch for john the
+ripper to support MPI. MPI allows you to use multiple processors on a
+single system, or a cluster of systems for cracking passwords using
+john the ripper. You need in this case OpenMPI, also available from
+the SlackBuilds.org repository. But the author of the program does not
+recommend use any hacks for parallel processing (see in the bottom of page
+http://www.openwall.com/lists/john-users/2005/08/24/4). Use it at own risk!
+
+Slackbuild contain also jambo patch. The jumbo patch enables processing
+of many password hash types and ciphers that are not supported by the
+official JtR. Both patches are disabled by default.
+
+Note this will not build in parallel, set MAKEFLAGS="-j1" if you have
+problems. \ No newline at end of file