% john, cracking, passwords # Auto-detect and crack john # Crack with wordlist john --wordlist= # Crack NTLM john --format=nt --wordlist= # Crack MD5 john --format=raw-md5 --wordlist= # Crack SHA-512 Linux john --format=sha512crypt --wordlist= # Crack bcrypt john --format=bcrypt --wordlist= # Show cracked passwords john --show # With rules john --wordlist= --rules # SSH key crack ssh2john > ssh_hash.txt && john --wordlist= ssh_hash.txt # ZIP file crack zip2john > zip_hash.txt && john --wordlist= zip_hash.txt # RAR file crack rar2john > rar_hash.txt && john --wordlist= rar_hash.txt # PDF crack pdf2john > pdf_hash.txt && john --wordlist= pdf_hash.txt # Office document crack office2john > office_hash.txt && john --wordlist= office_hash.txt # KeePass crack keepass2john > keepass_hash.txt && john --wordlist= keepass_hash.txt # Linux shadow file unshadow /etc/passwd /etc/shadow > unshadowed.txt && john --wordlist= unshadowed.txt # List available formats john --list=formats $ hashfile: find . -name "*.txt" -o -name "*.hash" 2>/dev/null $ wordlist: echo "/usr/share/wordlists/rockyou.txt" $ ssh_key: find . -name "id_rsa" -o -name "*.pem" 2>/dev/null $ zip_file: find . -name "*.zip" 2>/dev/null $ rar_file: find . -name "*.rar" 2>/dev/null $ pdf_file: find . -name "*.pdf" 2>/dev/null $ office_file: find . -name "*.docx" -o -name "*.xlsx" 2>/dev/null $ kdbx_file: find . -name "*.kdbx" 2>/dev/null