<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-GB">
	<id>https://act.gcai.dev/index.php?action=history&amp;feed=atom&amp;title=Openwall_-_John_the_Ripper_Password_Cracker</id>
	<title>Openwall - John the Ripper Password Cracker - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://act.gcai.dev/index.php?action=history&amp;feed=atom&amp;title=Openwall_-_John_the_Ripper_Password_Cracker"/>
	<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Openwall_-_John_the_Ripper_Password_Cracker&amp;action=history"/>
	<updated>2026-05-08T10:58:41Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.3</generator>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Openwall_-_John_the_Ripper_Password_Cracker&amp;diff=5312&amp;oldid=prev</id>
		<title>Globalcyberalliance: Updated via script</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Openwall_-_John_the_Ripper_Password_Cracker&amp;diff=5312&amp;oldid=prev"/>
		<updated>2023-10-25T23:53:32Z</updated>

		<summary type="html">&lt;p&gt;Updated via script&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en-GB&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 23:53, 25 October 2023&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l3&quot;&gt;Line 3:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 3:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;This tool is called John the Ripper, an Open Source password security auditing and password recovery tool. It is designed to be compatible with various operating systems.  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;This tool is called John the Ripper, an Open Source password security auditing and password recovery tool. It is designed to be compatible with various operating systems.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;   &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;   &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  One of the main features of John the Ripper is its support for a wide range of hash and cipher types. It can handle user passwords from Unix flavors such as Linux, *BSD, Solaris, AIX, QNX, as well as macOS, Windows, &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;quot;&lt;/del&gt;web apps&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;quot; &lt;/del&gt;like WordPress, groupware like Notes/Domino, and database servers like SQL and LDAP.  &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  One of the main features of John the Ripper is its support for a wide range of hash and cipher types. It can handle user passwords from Unix flavors such as Linux, *BSD, Solaris, AIX, QNX, as well as macOS, Windows, web apps like WordPress, groupware like Notes/Domino, and database servers like SQL and LDAP.  &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;   &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;   &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  Additionally, John the Ripper can also work with network traffic captures, allowing it to crack Windows network authentication and WiFi WPA-PSK, among others. It can even decrypt encrypted private keys used in SSH, GnuPG, and cryptocurrency wallets. Furthermore, it has the capability to handle filesystems and disks on macOS.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  Additionally, John the Ripper can also work with network traffic captures, allowing it to crack Windows network authentication and WiFi WPA-PSK, among others. It can even decrypt encrypted private keys used in SSH, GnuPG, and cryptocurrency wallets. Furthermore, it has the capability to handle filesystems and disks on macOS.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key mediawiki-actmw:diff::1.12:old-5014:rev-5312 --&gt;
&lt;/table&gt;</summary>
		<author><name>Globalcyberalliance</name></author>
	</entry>
	<entry>
		<id>https://act.gcai.dev/index.php?title=Openwall_-_John_the_Ripper_Password_Cracker&amp;diff=5014&amp;oldid=prev</id>
		<title>Globalcyberalliance: Created via script</title>
		<link rel="alternate" type="text/html" href="https://act.gcai.dev/index.php?title=Openwall_-_John_the_Ripper_Password_Cracker&amp;diff=5014&amp;oldid=prev"/>
		<updated>2023-10-25T14:06:51Z</updated>

		<summary type="html">&lt;p&gt;Created via script&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;=Description=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This tool is called John the Ripper, an Open Source password security auditing and password recovery tool. It is designed to be compatible with various operating systems. &lt;br /&gt;
 &lt;br /&gt;
 One of the main features of John the Ripper is its support for a wide range of hash and cipher types. It can handle user passwords from Unix flavors such as Linux, *BSD, Solaris, AIX, QNX, as well as macOS, Windows, &amp;quot;web apps&amp;quot; like WordPress, groupware like Notes/Domino, and database servers like SQL and LDAP. &lt;br /&gt;
 &lt;br /&gt;
 Additionally, John the Ripper can also work with network traffic captures, allowing it to crack Windows network authentication and WiFi WPA-PSK, among others. It can even decrypt encrypted private keys used in SSH, GnuPG, and cryptocurrency wallets. Furthermore, it has the capability to handle filesystems and disks on macOS.&lt;br /&gt;
 &lt;br /&gt;
 With its extensive compatibility and support for various hash and cipher types, John the Ripper is a versatile tool for password security auditing and recovery. It provides users with the ability to test the strength of their passwords and recover lost or forgotten passwords in a variety of scenarios.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
=More Information=&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://www.openwall.com/john/&lt;br /&gt;
[[Category:Passwords]]&lt;br /&gt;
[[Category:Security Testing &amp;amp; Auditing]]&lt;/div&gt;</summary>
		<author><name>Globalcyberalliance</name></author>
	</entry>
</feed>