Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

John the Ripper: The Basics

Premium room

Learn how to use John the Ripper, a powerful and adaptable hash-cracking tool.

easy

60 min

156,701

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

is a well-known, well-loved, and versatile hash-cracking tool. It combines a fast cracking speed with an extraordinary range of compatible hash types.

Learning Prerequisites

For maximum benefit, we recommend you attempt this room after the first three introductory rooms about cryptography.

There are no other learning prerequisites except basic command line abilities.

Learning Objectives

Upon the completion of this room, you learn about using John for:

  • Cracking Windows authentication hashes
  • Crack /etc/shadow hashes
  • Cracking password-protected Zip files
  • Cracking password-protected RAR files
  • Cracking keys

Starting with Task 4, you need to apply either on the attached , the AttackBox, or your own system. For your convenience, you can download the required task files as a single Zip file from this task by pressing the Download Task Files button below.

Answer the questions below

Let’s begin!

Ready to learn Cyber Security?

The John the Ripper: The Basics room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.