Have you met Johnny?

If you have never heard of or used John the Ripper, then you most likely have not heard of or used Johnny either. So, what, or who, is Johnny? Well, Johnny is not a who, more like a what.

What Johnny is, is a graphical interface to John the Ripper, which is a very powerful and cross-platform password cracking tool that you probably have installed in your favorite Linux or BSD distribution, or other UNIX-like operating system. Johnny just takes what used to be a command line task and provides a user-friendly interface to it.

If you have some free time, it is a very good tool with which to crack passwords in a password file that you have legal access to, for example, the /etc/shadow file from your Linux installation.

Just like John the Ripper, there is nothing really fancy about Johnny. It just does its job very easily and very well, too. All it needs is a password file to crack. Here are a few screen shots of Johnny:

This screen shot shows with a password file ready to crack.
Johnny Password

Just a few seconds later, Johnny is done, and password is cracked. The cracked password file is from a test installation of a Linux distribution.
Johnny John the Ripper

Johnny’s settings.
Ripper GUI

If Johnny is not in the repository of your favorite distribution, binaries and source code are available from here.

Related Posts

Linux Mint 10 manual disk partitioning guide Linux Mint 10, aka Julia, is the latest stable release of Linux Mint, a desktop-oriented distribution based on Ubuntu. Just like earlier releases of L...
How to install and configure Adobe Flash Player 10.3 on Fedora 15 Fedora 15, code-named Lovelock, does not ship with commercial applications. Which means that you are not able to install essential applications like A...
Your choice: Cinnamon or MATE I get a lot of queries regarding the difference(s) between the MATE and Cinnamon desktop environments. And of course such queries tend to come from th...
Getting Started with Swift on Linux When I wrote my first line of Swift code I immediately had visions of being able to use this beautiful programming language for more than just iOS and...
How to customize Linux Mint 10 After a review of Linux Mint 10, the next logical step is to write a few tutorials and tips for those that might need it. The first of these tutorials...
Pentesting, digital forensics, and hacking distributions If you are interested in penetration testing (pentesting), digital forensics, and in playing with software applications that hackers use on a daily ba...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


4 Comments

  1. Pingback: Links 27/8/2012: Twitter Joins Linux Foundation, *ubuntu 12.04.1 | Techrights

  2. why are the two first screenshots same?

Leave a Comment

Your email address will not be published. Required fields are marked *

*