<s>
John	B-Application
the	I-Application
Ripper	I-Application
is	O
a	O
free	B-Application
password	O
cracking	O
software	O
tool	O
.	O
</s>
<s>
Originally	O
developed	O
for	O
the	O
Unix	B-Application
operating	I-Application
system	I-Application
,	O
it	O
can	O
run	O
on	O
fifteen	O
different	O
platforms	O
(	O
eleven	O
of	O
which	O
are	O
architecture-specific	O
versions	O
of	O
Unix	B-Application
,	O
DOS	B-Device
,	O
Win32	B-Application
,	O
BeOS	B-Application
,	O
and	O
OpenVMS	B-Operating_System
)	O
.	O
</s>
<s>
It	O
is	O
among	O
the	O
most	O
frequently	O
used	O
password	O
testing	O
and	O
breaking	O
programs	O
as	O
it	O
combines	O
a	O
number	O
of	O
password	O
crackers	O
into	O
one	O
package	O
,	O
autodetects	O
password	O
hash	B-Algorithm
types	O
,	O
and	O
includes	O
a	O
customizable	O
cracker	O
.	O
</s>
<s>
It	O
can	O
be	O
run	O
against	O
various	O
encrypted	O
password	O
formats	O
including	O
several	O
crypt	O
password	O
hash	B-Algorithm
types	O
most	O
commonly	O
found	O
on	O
various	O
Unix	B-Application
versions	O
(	O
based	O
on	O
DES	B-Algorithm
,	O
MD5	B-Algorithm
,	O
or	O
Blowfish	B-Algorithm
)	O
,	O
Kerberos	B-Protocol
AFS	B-Application
,	O
and	O
Windows	O
NT/2000/XP/2003	O
LM	O
hash	B-Algorithm
.	O
</s>
<s>
Additional	O
modules	O
have	O
extended	O
its	O
ability	O
to	O
include	O
MD4-based	O
password	O
hashes	B-Algorithm
and	O
passwords	O
stored	O
in	O
LDAP	B-Protocol
,	O
MySQL	B-Application
,	O
and	O
others	O
.	O
</s>
<s>
the	O
user	O
(	O
AZl	O
)	O
and	O
the	O
hash	B-Algorithm
associated	O
with	O
that	O
user	O
(	O
zWwxIh15Q	O
)	O
.	O
</s>
<s>
The	O
third	O
line	O
is	O
the	O
command	O
for	O
running	O
John	B-Application
the	I-Application
Ripper	I-Application
utilizing	O
the	O
"	O
-w	O
"	O
flag	O
.	O
</s>
<s>
"	O
password.lst	O
"	O
is	O
the	O
name	O
of	O
a	O
text	O
file	O
full	O
of	O
words	O
the	O
program	O
will	O
use	O
against	O
the	O
hash	B-Algorithm
,	O
pass.txt	O
makes	O
another	O
appearance	O
as	O
the	O
file	O
we	O
want	O
John	O
to	O
work	O
on	O
.	O
</s>
<s>
Loaded	O
1	O
password	O
hash	B-Algorithm
the	O
one	O
we	O
saw	O
with	O
the	O
"	O
cat	B-Device
"	O
command	O
and	O
the	O
type	O
of	O
hash	B-Algorithm
John	O
thinks	O
it	O
is	O
(	O
Traditional	O
DES	B-Algorithm
)	O
.	O
</s>
<s>
One	O
of	O
the	O
modes	O
John	O
can	O
use	O
is	O
the	O
dictionary	B-Operating_System
attack	O
.	O
</s>
<s>
It	O
takes	O
text	O
string	O
samples	O
(	O
usually	O
from	O
a	O
file	O
,	O
called	O
a	O
wordlist	O
,	O
containing	O
words	O
found	O
in	O
a	O
dictionary	B-Operating_System
or	O
real	O
passwords	O
cracked	O
before	O
)	O
,	O
encrypting	O
it	O
in	O
the	O
same	O
format	O
as	O
the	O
password	O
being	O
examined	O
(	O
including	O
both	O
the	O
encryption	O
algorithm	O
and	O
key	O
)	O
,	O
and	O
comparing	O
the	O
output	O
to	O
the	O
encrypted	O
string	O
.	O
</s>
<s>
It	O
can	O
also	O
perform	O
a	O
variety	O
of	O
alterations	O
to	O
the	O
dictionary	B-Operating_System
words	O
and	O
try	O
these	O
.	O
</s>
<s>
Many	O
of	O
these	O
alterations	O
are	O
also	O
used	O
in	O
John	O
's	O
single	O
attack	O
mode	O
,	O
which	O
modifies	O
an	O
associated	O
plaintext	O
(	O
such	O
as	O
a	O
username	O
with	O
an	O
encrypted	O
password	O
)	O
and	O
checks	O
the	O
variations	O
against	O
the	O
hashes	B-Algorithm
.	O
</s>
<s>
In	O
this	O
type	O
of	O
attack	O
,	O
the	O
program	O
goes	O
through	O
all	O
the	O
possible	O
plaintexts	O
,	O
hashing	O
each	O
one	O
and	O
then	O
comparing	O
it	O
to	O
the	O
input	O
hash	B-Algorithm
.	O
</s>
<s>
This	O
method	O
is	O
useful	O
for	O
cracking	O
passwords	O
that	O
do	O
not	O
appear	O
in	O
dictionary	B-Operating_System
wordlists	O
,	O
but	O
it	O
takes	O
a	O
long	O
time	O
to	O
run	O
.	O
</s>
