John The Ripper Full Tutorial (Linux,windows,hash,wifi handshake cracking)

John The Ripper Full Tutorial 

john the ripper is an advanced password cracking tool used by many which are free and open source. John the Ripper initially developed for UNIX operating system but now it works on Fifteen different platforms.

John The Ripper widely used to reduce the risk of network security causes by weak passwords as well as to measure other security flaws regarding encryptions. John The Ripper uses a wide variety of password cracking techniques against user accounts of many operating systems, password encryptions, and hashes.
such as crypt password hash types( MD5, DES or Blowfish).
Windows NT/XP/2000/2003/LM hash.
Also, passwords stored in MySQL, LDAP, and others.

John The Ripper is a combination of the number of password crackers in one package makes it one of the best password testing and breaking program which autodetects password hashes and customizable password cracker.

John the Ripper has an official free version, a community enhanced version, and also a pro version.

In this tutorial, we will see the most common password cracking like Linux password, Zip file protected with a password, Windows password, and Wifi Handshake file cracking.

    Installing and Downloading John the Ripper in Kali Linux.

    first, we need to install John The Ripper,
    it comes preinstalled in Kali Linux 

    to install in other Linux Os simply use command.

    # sudo apt-get install john 

    For Windows, Mac and Android go to the official site of JTR 

    Type John in terminal to see options.

    John The Ripper Full Tutorial

     Cracking Linux user Passwords:
     Cracking Linux password in John The Ripper also called unshadowing because Linux passwords are saved in Shadow files which located in

    so cracking Linux password or unshadow password simply use this command in John The Ripper.

    # john /etc/shadow

    Cracking Linux Password:

    As you can see John cracked the password in the shadow file.
    This process sometimes takes time depending upon password complexity and the number of users. 


    Decrypting MD5 hash: 

    There are lots of hash types present over the internet but we are going to use MD5 in this article MD5 hash is a new type of encryption now widely used so let's crack the hash.
     first, we need to store the hash in .txt file which can then accessible for john the ripper using the command.

     I stored MD5 hash in MD5hash.txt and used this command.

    # john --format=raw-MD5 /root/Desktop/MD5hash.txt

    Decrypting MD5 hash:

    So John cracked the hash successfully and also correctly.

    You can also decrypt other hashes like MD5 just by changing the command of hash format.


    Cracking password protected Zip/RAR file: 

     Zip/RAR file is the most commonly used password protection to files and is widely used. we many times stumbled upon a password-protected ZIP file that has lots of valuable data in it. So here we will crack the Zip file password in John the Ripper. And Also John the Ripper RAR password Cracking

     Lots of Folks Asking about how to create password protected files in Linux, So let's cover them up also.

    First, select the file which you want to password encrypted and right-click on it and select Create Archive.

    create password protected file in Linux

    After that select which compression you want to choose we will ZIP which is way bottom in there.

    create password protected file in Linux

    Now, Click on other options where you can see the password field type password you want, and click on create. 

    create password protected file in Linux

    So this is how you can create a password-protected ZIP file in Kali Linux. 

     We created a password-protected Zip file now we will Decrypt it using John The Ripper.

    Firstly we need to Export hashes to .txt file using this command.

    # zip2john [Zipfile]>zipfile.txt

    This command will export zip keys to .txt file which we will feed to John The Ripper. in my case.

    Cracking password protected Zip/RAR file:

     It's okay if this shows that, if you check zipfile.txt or cat it you will see their zip keys are exported successfully.

    Now use this command to crack those keys in john. or Crack Zip password in John the Ripper

    # john --format=zip [zip.txt]

    Cracking password protected Zip/RAR file:

    As you can see the password is decrypted successfully. This is a John the Ripper Zip crack.

    If you want to crack a password of RAR with John the Ripper then Use the command.

    # rar2john [zipfile]>zipkey.txt


    Cracking windows user password:

    In this John The Ripper Tutorial we will crack Windows password stored in SAM and SYSTEM files located in


    Just copy these files using CMD type these commands

    reg save hklm\SYSTEM     (for SYSTEM file)

    reg save hklm\SAM      (for SAM file)

    Now take these files in Kali Linux and need to extract Windows keys so we can crack them use this command

    # samdump2 SYSTEM SAM>keys.txt

    Details of windows users' passwords will be saved in keys.txt and now we can feed it to John the ripper so it can crack it.

    # john --format=LM --user=administrator keys.txt

    you can choose the username you want to crack simply specify there instead of an administrator. and john will crack those passwords for you.

    If you want to use a custom wordlist then use this command.

    # john --wordlist=[wordlist.txt] --user=administrator keys.txt


    Cracking WPA/WPA2 handshake using John The Ripper.

    Here in this John the Ripper Tutorial will only show you how to crack WPA/WPA2 handshake not to capture it. (that's for another day)

    The captured handshake must be in .hccap file it not then convert it.

    now use this command to export keys in a handshake.
    # hccap2john [capture]>keys.txt
    now keys will be exported to keys.txt so we will crack this handshake using a custom wordlist.
    use this command.
    # john --wordlist=[wordlist.txt] /keys.txt
    and john will start cracking process, a succession of attack depends upon password must be present in wordlist if that wordlist was not worked try a different one.


    This is how you can crack various password hashes, encryptions, and user passwords using John the Ripper.


    These are the most common password encryptions you will encounter many times in your experience with hacking and penetration testing and john the ripper is here to help you with every one of them. you will get pretty much ideas about how to crack other password encryptions using John The Ripper.

    sometimes it takes too much time to crack a password or it gets failed of password not found in many cases than using custom wordlists can help you here but the cracking password is dependent upon password complexity and a number of character used. 

      Such as using variables like (!@#$%^&*_<>)  and combining it with lowercase and uppercase with more than 12 characters long passwords can make password cracking insanely difficult.

    Also, Check out

    You may like these posts