If you have never heard of or used John the Ripper, then you most likely have not heard of or used Johnny either. So, what, or who, is Johnny? Well, Johnny is not a who, more like a what.

What Johnny is, is a graphical interface to John the Ripper, which is a very powerful and cross-platform password cracking tool that you probably have installed in your favorite Linux or BSD distribution, or other UNIX-like operating system. Johnny just takes what used to be a command line task and provides a user-friendly interface to it.

Related Post:  Dual-boot Deepin 2014 and Windows 7 on a PC with UEFI firmware

If you have some free time, it is a very good tool with which to crack passwords in a password file that you have legal access to, for example, the /etc/shadow file from your Linux installation.

Just like John the Ripper, there is nothing really fancy about Johnny. It just does its job very easily and very well, too. All it needs is a password file to crack. Here are a few screen shots of Johnny:

Related Post:  Manual disk partitioning guide for Linux Mint 9 and Ubuntu 10.04

This screen shot shows with a password file ready to crack.
Johnny Password

Just a few seconds later, Johnny is done, and password is cracked. The cracked password file is from a test installation of a Linux distribution.
Johnny John the Ripper

Johnny’s settings.
Ripper GUI

If Johnny is not in the repository of your favorite distribution, binaries and source code are available from here.

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer runs network ads?  Yep, no more ads from the usual suspects that track you across the Internet.  But since  I still need to pay to keep the site running, feel free to make a small donation by PayPal.

Subscribe for updates. Trust me, no spam!

Mailchimp Signup Form

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event for 2020.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

4 Responses

      1. Yeah, nice game 🙂
        now the password that cracked is shown: sun123
        I pay attention to that ’cause I translate plenty of this website’s articles in my native language and I really like it.
        thanks…

Leave a Reply to finid Cancel reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter
Mailchimp Signup Form

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.

Anastasia Marchenkova

An invitation from Anastasia Marchenkova

Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.