diff options
author | Murat D. Kadirov <banderols@gmail.com> | 2010-05-11 22:55:19 +0200 |
---|---|---|
committer | David Somero <xgizzmo@slackbuilds.org> | 2010-05-11 22:55:19 +0200 |
commit | 4ccbcd7957f264b46d9550bc0a6912b1990bc8d7 (patch) | |
tree | 690c5b17da6dd01405bd823968126b3160664f97 /system/john/README | |
parent | 9690d1dba9d24ec29728d5473da4d2b69af4a17e (diff) |
system/john: Added to 12.1 repository
Diffstat (limited to 'system/john/README')
-rw-r--r-- | system/john/README | 22 |
1 files changed, 22 insertions, 0 deletions
diff --git a/system/john/README b/system/john/README new file mode 100644 index 000000000000..01863b67ca79 --- /dev/null +++ b/system/john/README @@ -0,0 +1,22 @@ +John the Ripper is a fast password cracker, currently available for many +flavors of Unix (11 are officially supported, not counting different +architectures), Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to +detect weak Unix passwords. Besides several crypt(3) password hash types +most commonly found on various Unix flavors, supported out of the box are +Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with +contributed patches. + +SlackBuild contain updated version of Ryan Lim's patch for john the +ripper to support MPI. MPI allows you to use multiple processors on a +single system, or a cluster of systems for cracking passwords using +john the ripper. You need in this case OpenMPI, also available from +the SlackBuilds.org repository. But the author of the program does not +recommend use any hacks for parallel processing (see in the bottom of page +http://www.openwall.com/lists/john-users/2005/08/24/4). Use it at own risk! + +Slackbuild contain also jambo patch. The jumbo patch enables processing +of many password hash types and ciphers that are not supported by the +official JtR. Both patches are disabled by default. + +Note this will not build in parallel, set MAKEFLAGS="-j1" if you have +problems.
\ No newline at end of file |