Dynamic format used in John the Ripper jumbo way slower than MDXFind

I’m currently doing some research on a pretty huge list of hashes (approx. 2 millions) and thus I’d like to improve my cracking speed. The hash format is 12 rounds of SHA512(password + salt), which could be written like this: sha512(sha512… Continue reading Dynamic format used in John the Ripper jumbo way slower than MDXFind

Normal for John the Ripper to fail to crack password after having successfully cracked it before? [closed]

The first two or three times I ran it, John the Ripper successfully cracked a password file with a single hashed password. Since then, however, I’ve only been getting this result (with the same password file and JtR version):

0 password … Continue reading Normal for John the Ripper to fail to crack password after having successfully cracked it before? [closed]

John The Ripper Error: No password hashes loaded when cracking a zip file in kali linux

I was practicing bruteforce attacks using John The Ripper. I want to crack a zip file. I obtained the hash and stored it in a zip file but when I attempt to crack the zip file it is giving me an error saying No password hashes loaded

This… Continue reading John The Ripper Error: No password hashes loaded when cracking a zip file in kali linux