slackbuilds/system/john
dsomero 37e1e35bd2 system/john: ARCH fixes and cleanup.
Signed-off-by: dsomero <xgizzmo@slackbuilds.org>
2011-05-03 09:08:24 -05:00
..
README system/john: Updated for version 1.7.3.1 2010-05-13 00:40:44 +02:00
john-1.7.3.1-all-2.diff.gz system/john: Added to 12.1 repository 2010-05-11 22:55:19 +02:00
john-1.7.3.1-all-2.diff.gz.asc system/john: Added to 12.1 repository 2010-05-11 22:55:19 +02:00
john-1.7.3.1-mpi8-small.patch.gz system/john: Added to 12.1 repository 2010-05-11 22:55:19 +02:00
john-1.7.3.1-mpi8-small.patch.gz.asc system/john: Added to 12.1 repository 2010-05-11 22:55:19 +02:00
john.SlackBuild system/john: ARCH fixes and cleanup. 2011-05-03 09:08:24 -05:00
john.info system/john: Updated for version 1.7.3.1 2010-05-13 00:40:44 +02:00
slack-desc system/john: Updated for version 1.7.3.1 2010-05-13 00:40:44 +02:00

README

John the Ripper is a fast password cracker.  Its primary purpose is to detect 
weak passwords.  Besides several crypt(3) password hash types most commonly 
found on various Unix flavors, supported out of the box are Kerberos AFS and 
Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

This script includes an option to apply Ryan Lim's patch for JTR to support
MPI.  MPI allows you to use multiple processors on a system or even a cluster 
of systems for cracking passwords using JTR.  If you decide to apply this, you
will also need openmpi installed.  JTR's author does not recommend using the
patch, so use it at your own risk - for more information, see this link:
  http://www.openwall.com/lists/john-users/2005/08/24/4
This script also contains an optional "jumbo" patch, which enables processing 
of many password hash types and ciphers that are not otherwise supported.

Note this will not build in parallel; unset MAKEFLAGS if you have problems.