• home
  • pentesting tools news
  • Security News
  
Tweet My status    Share

John The Ripper 1.8.0 released!

Update Pentesting tools News 31-May-2013

john the ripper released

Yesterday Openwall released an updated version of John the Ripper, a Open Source password-cracking for security auditing which supports Unix, Windows, DOS, BeOS, OpenVMS and also used and recommended combined with Aircrack-ng Suite for the creation/mangle the wordlist for dictionary or bruteforce attack using --stout.

Same the last release has been sponsored by Rapid7, a leading provider of unified vulnerability management and penetration testing solutions.

Changes in 1.8.0 release are:

  • Revised the incremental mode to let the current character counts grow for each character position independently, with the aim to improve efficiency in terms of successful guesses per candidate passwords tested.
  • Revised the pre-defined incremental modes, as well as external mode filters that are used to generate .chr files.
  • Added makechr, a script to (re-)generate .chr files.
  • Added the "--fork=N" and "--node=MIN[-MAX]/TOTAL" options for trivial parallel and distributed processing.
  • Enhanced the status reporting to include four distinct speed metrics (g/s, p/s, c/s, and C/s).
  • Renamed many of the formats.
  • Updated the documentation.
  • Fixed a bug in the Keyboard external mode (uninitialized variables on "--restore" or when minlength is greater than 1)

More details about this release can be found on Openwall Official WebSite.

The latest downloadable version of JTR and Jumbo patches are available here:
Download John the Ripper.


UPDATING 04 June 2013:

Jumbo based on 1.8.x will be available at a later time, so for now I recommend to use the previus version/branches "john-1.7.9-jumbo-7".

This integrates lots of contributed patches: adding GPU support (CUDA and OpenCL), support for a hundred of additional hash and cipher types.


Enjoy, Jano


Ubuntu Logo
Aircrack-ng Logo


 In this Site & Aircrack-ng


©2010-2013 JanoWeb.NET | All Rights Reserved | Terms & Policy |
Valid XHTML 1.0 TransitionalValid CSS 3Creative Commons Licenses WebSite Reputation