Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

John the Ripper

Index John the Ripper

John the Ripper is a free password cracking software tool. [1]

32 relations: Andrew File System, BeOS, Blowfish (cipher), Brute-force attack, Brute-force search, Crack (password software), Cross-platform, Crypt (Unix), Cryptographic hash function, Data Encryption Standard, Debian, Dictionary, Dictionary attack, DOS, Encryption, Free software, GNU General Public License, Hacking tool, Hash function, Kerberos (protocol), LAN Manager, Lightweight Directory Access Protocol, MD4, MD5, Microsoft Windows, MySQL, OpenVMS, Openwall Project, Password cracking, Security hacker, Solar Designer, Unix.

Andrew File System

The Andrew File System (AFS) is a distributed file system which uses a set of trusted servers to present a homogeneous, location-transparent file name space to all the client workstations.

New!!: John the Ripper and Andrew File System · See more »

BeOS

BeOS is an operating system for personal computers first developed by Be Inc. in 1991.

New!!: John the Ripper and BeOS · See more »

Blowfish (cipher)

Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products.

New!!: John the Ripper and Blowfish (cipher) · See more »

Brute-force attack

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.

New!!: John the Ripper and Brute-force attack · See more »

Brute-force search

In computer science, brute-force search or exhaustive search, also known as generate and test, is a very general problem-solving technique that consists of systematically enumerating all possible candidates for the solution and checking whether each candidate satisfies the problem's statement.

New!!: John the Ripper and Brute-force search · See more »

Crack (password software)

Crack is a Unix password cracking program designed to allow system administrators to locate users who may have weak passwords vulnerable to a dictionary attack.

New!!: John the Ripper and Crack (password software) · See more »

Cross-platform

In computing, cross-platform software (also multi-platform software or platform-independent software) is computer software that is implemented on multiple computing platforms.

New!!: John the Ripper and Cross-platform · See more »

Crypt (Unix)

In Unix computing, crypt is a utility program used for encryption.

New!!: John the Ripper and Crypt (Unix) · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: John the Ripper and Cryptographic hash function · See more »

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.

New!!: John the Ripper and Data Encryption Standard · See more »

Debian

Debian is a Unix-like computer operating system that is composed entirely of free software, and packaged by a group of individuals participating in the Debian Project.

New!!: John the Ripper and Debian · See more »

Dictionary

A dictionary, sometimes known as a wordbook, is a collection of words in one or more specific languages, often arranged alphabetically (or by radical and stroke for ideographic languages), which may include information on definitions, usage, etymologies, pronunciations, translation, etc.

New!!: John the Ripper and Dictionary · See more »

Dictionary attack

In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.

New!!: John the Ripper and Dictionary attack · See more »

DOS

DOS is a family of disk operating systems.

New!!: John the Ripper and DOS · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: John the Ripper and Encryption · See more »

Free software

Free software or libre software is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, and distribute it and any adapted versions.

New!!: John the Ripper and Free software · See more »

GNU General Public License

The GNU General Public License (GNU GPL or GPL) is a widely used free software license, which guarantees end users the freedom to run, study, share and modify the software.

New!!: John the Ripper and GNU General Public License · See more »

Hacking tool

A hacking tool is a program designed to assist with hacking, or a piece of software which can be used for hacking purposes.

New!!: John the Ripper and Hacking tool · See more »

Hash function

A hash function is any function that can be used to map data of arbitrary size to data of a fixed size.

New!!: John the Ripper and Hash function · See more »

Kerberos (protocol)

Kerberos is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

New!!: John the Ripper and Kerberos (protocol) · See more »

LAN Manager

LAN Manager was a Network operating system (NOS) available from multiple vendors and developed by Microsoft in cooperation with 3Com Corporation.

New!!: John the Ripper and LAN Manager · See more »

Lightweight Directory Access Protocol

The Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.

New!!: John the Ripper and Lightweight Directory Access Protocol · See more »

MD4

The MD4 Message-Digest Algorithm is a cryptographic hash function developed by Ronald Rivest in 1990.

New!!: John the Ripper and MD4 · See more »

MD5

The MD5 algorithm is a widely used hash function producing a 128-bit hash value.

New!!: John the Ripper and MD5 · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: John the Ripper and Microsoft Windows · See more »

MySQL

MySQL ("My S-Q-L") is an open-source relational database management system (RDBMS).

New!!: John the Ripper and MySQL · See more »

OpenVMS

OpenVMS is a closed-source, proprietary computer operating system for use in general-purpose computing.

New!!: John the Ripper and OpenVMS · See more »

Openwall Project

The Openwall Project is a source for various software, including Openwall GNU/*/Linux (Owl), a security-enhanced operating system designed for servers.

New!!: John the Ripper and Openwall Project · See more »

Password cracking

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.

New!!: John the Ripper and Password cracking · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: John the Ripper and Security hacker · See more »

Solar Designer

Alexander Peslyak (Александр Песляк) (born 1977), better known as Solar Designer, is a security specialist from Russia.

New!!: John the Ripper and Solar Designer · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: John the Ripper and Unix · See more »

Redirects here:

John the ripper, John-the-Ripper.

References

[1] https://en.wikipedia.org/wiki/John_the_Ripper

OutgoingIncoming
Hey! We are on Facebook now! »