John the Ripper will provide users with a fast password cracker. Its primary purpose is to detect weak Unix passwords.
Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos/AFS and Windows LM hashes, as well as DES-based tripcodes, plus many more hashes and ciphers in "community enhanced" -jumbo versions and/or with other contributed patches.
What's New in This Release: [ read full changelog ]
· Added optional parallelization of the MD5-based crypt(3) code with OpenMP.
· Added optional parallelization of the bitslice DES code with OpenMP.
· Replaced the bitslice DES key setup algorithm with a faster one, which
· significantly improves performance at LM hashes, as well as at DES-based
· crypt(3) hashes when there's just one salt (or very few salts).
· Optimized the DES S-box x86-64 (16-register SSE2) assembly code.
· Added support for 10-character DES-based tripcodes (not optimized yet).
· Added support for the "$2y$" prefix of bcrypt hashes.
· Added two more hash table sizes (16M and 128M entries) for faster processing of very large numbers of hashes per salt (over 1M).
· Added two pre-defined external mode variables: "abort" and "status", which
· let an external mode request the current cracking session to be aborted or the status line to be displayed, respectively.
· Made some minor optimizations to external mode function calls and virtual
· machine implementation.
· The "--make-charse...