slackbuilds/system/john
Murat D. Kadirov 19df9e90d8 system/john: Updated for version 1.7.3.1 2010-05-13 00:40:44 +02:00
..
README system/john: Updated for version 1.7.3.1 2010-05-13 00:40:44 +02:00
john-1.7.3.1-all-2.diff.gz system/john: Added to 12.1 repository 2010-05-11 22:55:19 +02:00
john-1.7.3.1-all-2.diff.gz.asc system/john: Added to 12.1 repository 2010-05-11 22:55:19 +02:00
john-1.7.3.1-mpi8-small.patch.gz system/john: Added to 12.1 repository 2010-05-11 22:55:19 +02:00
john-1.7.3.1-mpi8-small.patch.gz.asc system/john: Added to 12.1 repository 2010-05-11 22:55:19 +02:00
john.SlackBuild system/john: Updated for version 1.7.3.1 2010-05-13 00:40:44 +02:00
john.info system/john: Updated for version 1.7.3.1 2010-05-13 00:40:44 +02:00
slack-desc system/john: Updated for version 1.7.3.1 2010-05-13 00:40:44 +02:00

README

John the Ripper is a fast password cracker.  Its primary purpose is to detect 
weak passwords.  Besides several crypt(3) password hash types most commonly 
found on various Unix flavors, supported out of the box are Kerberos AFS and 
Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.

This script includes an option to apply Ryan Lim's patch for JTR to support
MPI.  MPI allows you to use multiple processors on a system or even a cluster 
of systems for cracking passwords using JTR.  If you decide to apply this, you
will also need openmpi installed.  JTR's author does not recommend using the
patch, so use it at your own risk - for more information, see this link:
  http://www.openwall.com/lists/john-users/2005/08/24/4
This script also contains an optional "jumbo" patch, which enables processing 
of many password hash types and ciphers that are not otherwise supported.

Note this will not build in parallel; unset MAKEFLAGS if you have problems.