Have you met Johnny?

If you have never heard of or used John the Ripper, then you most likely have not heard of or used Johnny either. So, what, or who, is Johnny? Well, Johnny is not a who, more like a what.

What Johnny is, is a graphical interface to John the Ripper, which is a very powerful and cross-platform password cracking tool that you probably have installed in your favorite Linux or BSD distribution, or other UNIX-like operating system. Johnny just takes what used to be a command line task and provides a user-friendly interface to it.

If you have some free time, it is a very good tool with which to crack passwords in a password file that you have legal access to, for example, the /etc/shadow file from your Linux installation.

Just like John the Ripper, there is nothing really fancy about Johnny. It just does its job very easily and very well, too. All it needs is a password file to crack. Here are a few screen shots of Johnny:

This screen shot shows with a password file ready to crack.
Johnny Password

Just a few seconds later, Johnny is done, and password is cracked. The cracked password file is from a test installation of a Linux distribution.
Johnny John the Ripper

Johnny’s settings.
Ripper GUI

If Johnny is not in the repository of your favorite distribution, binaries and source code are available from here.

Related Posts

GPT disk partitioning guide for Chakra 2011.4 GPT is an alternate disk partition table scheme that solves two issues associated with the MBR partition table scheme. It allows the configuration of ...
Manual disk partitioning guide for Ubuntu 11.04 Advanced or manual disk partitioning is available for those that want to create a custom set of partitions for installing Ubuntu 11.04. For whatever r...
Configure LVM in Foresight Linux Foresight is a Linux distribution built around the Conary package management system, with Gnome as the default desktop environment. Like most Linux di...
3 application-level “firewalls” for Linux distributions A packet filtering firewall, designed to regulate incoming and outgoing packets from a network or an operating system, is akin to security personnel g...
Customizing ALT Linux 5 Ark desktop ALT Linux is an rpm based distro that was just reviewed and listed on this site. It is a GNOME-based distro with decent graphical management utilitie...
GRUB-Install errors while attempting to dual-boot Windows 10 and Linux distributions Since Windows 10 was released, I've made several attempts to set up dual-boot systems between it and a few Linux distributions (Fedora 22, Ubuntu 15.0...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


4 Comments

  1. Pingback: Links 27/8/2012: Twitter Joins Linux Foundation, *ubuntu 12.04.1 | Techrights

  2. why are the two first screenshots same?

Leave a Comment

Your email address will not be published. Required fields are marked *

*