To access material, start machines and answer questions login.
is a well-known, well-loved, and versatile hash-cracking tool. It combines a fast cracking speed with an extraordinary range of compatible hash types.
Learning Prerequisites
For maximum benefit, we recommend you attempt this room after the first three introductory rooms about cryptography.
There are no other learning prerequisites except basic command line abilities.
Learning Objectives
Upon the completion of this room, you learn about using John for:
- Cracking Windows authentication hashes
- Crack
/etc/shadowhashes - Cracking password-protected Zip files
- Cracking password-protected RAR files
- Cracking keys
Starting with Task 4, you need to apply either on the attached , the AttackBox, or your own system. For your convenience, you can download the required task files as a single Zip file from this task by pressing the Download Task Files button below.
Let’s begin!
Ready to learn Cyber Security?
The John the Ripper: The Basics room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
