

There are also several mailing lists for John the Ripper, which average around 30 to 40 emails per month. Though it’s aimed at intermediate users who are comfortable using the command line, all the steps that you need to take to get the software running are well laid out.

John the Ripper has an excellent wiki, with step-by-step tutorials on how to build the software and use it to crack passwords. Play nice, support each other and encourage learning.The John the Ripper wiki has step-by-step tutorials on using the tool (Image credit: John the Ripper) We are not tech support, these posts should be kept on /r/techsupportĭon't be a dick. Low-effort content will be removed at moderator discretion

from security firms/pen testing companies is allowed within the confines of site-wide rules on self promotion found here, but will otherwise be considered spam. Spam is strictly forbidden and will result in a ban. Sharing of personal data is forbidden - no doxxing or IP dumping No "I got hacked" posts unless it's an interesting post-mortem of a unique attack. "How does HSTS prevent SSL stripping?" is a good question. Intermediate questions are welcomed - e.g.
