Comprehensive Guide to John the Ripper. Part 2: Utilities for extracting hashes

Table of contents

1. Introducing and Installing John the Ripper

2. Utilities for extracting hashes

2.1 How to Crack Password in John the Ripper

2.2 How to convert a file to John the Ripper hash

2.3 Where to see examples of hashes

2.4 Reference for all scripts to generate hashes for John the Ripper and Hashcat

2.5 Other utilities to extract hashes

2.6 What you need to know when posting hashes

3. How to start cracking passwords in John the Ripper (how to specify masks, dictionaries, hashes, formats, modes)



How to Crack Password in John the Ripper

John the Ripper can only crack hashes – it cannot work with encrypted files. The program cannot open, for example, an office document, enter a password there, etc.

This is a solvable problem – we need to compute (extract) the hash for the file of interest. John itself does not know how to do this. We need auxiliary utilities. You can view their list, for example, by typing the command:

locate *2john*

This is how the list looks like on the machine where I installed John from source:

Agree, the list is impressive!

On Kali Linux, these files are located in two directories:

  • script files in /usr/share/john/
  • and binaries in /usr/sbin/

These files are located in BlackArch:

  • script files in /usr/lib/john/ directory
  • binaries in /usr/bin/

If you compiled John the Ripper from source, then all of these files are collected in the run directory.

To find the file you need, use a command like this:


To find all files at once by extracting hashes, run:

locate *2john*

If you cannot find some file on your system (this can be done with the locate command), then download them from the source codes:

How to convert a file to John the Ripper hash

The scripts have been collected from a wide variety of places and written by many researchers, often based on research by other researchers. Therefore, they are written in different programming languages.

In general, the usage is pretty standard – you need to specify the program to run and, separated by a space, the file for which you want to calculate the hash.

The good news is that these hashes are shared by both Hashcat and John the Ripper. That is, you can use this table and these files to crack passwords in John the Ripper or Hashcat.

You can specify several files at once to extract their hashes – for example, several ZIP archives or several office documents.

An example of extracting a hash from a file, that is, from a ZIP archive:

./zip2john '/home/mial/test/'

Output example:

The first line contains the properties of the archive:

ver 2.0 PKZIP Encr: cmplen=339, decmplen=490, crc=F872015C type=8

The hash itself goes further:$pkzip2$1*1*2*0*153*1ea*f872015c*0*2b*8*153*f872*3dc8*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*$/pkzip2$

An example of a command that saves the hash to the file:

./zip2john '/home/mial/test/' >

An example of extracting a hash from a .7z archive:

./ '/mnt/disk_d/Arch/from_kali.7z'

Output example:

The first line warns that hashes can contain encrypted sensitive data and you need to be careful if you share the hash with someone or publish it online.

The second line is the hash itself:


Extract hash from MS Word 2019 file:

./ '/mnt/disk_d/Share/Secret.docx' 2>/dev/null

If you do not specify 2>/dev/null, then a warning about an outdated Python function in the script will be displayed – I hope this will be fixed in the future.

An example of extracting a hash from a handshake to hack Wi-Fi password:

./wpapcap2john ~/RT-725140.pcap

The wpapcap2john utility supports the -v option, so you can see more information if you like:

./wpapcap2john -vv ~/RT-725140.pcap

An example of extracting the VNC hash of a handshake from captured network traffic – this hash allows you to crack the VNC server password.

./vncpcap2john '/home/mial/VNC.pcapng'

Considering that the MAXIMUM (not the minimum) password length is 8 (!) Characters, and the algorithm itself is calculated very quickly, such hashes are doomed to be hacked: to$vnc$*894443629F4A9675809CFF5DA2E84651*271D94EB610B5C42588DC53506419E6A

Where to see examples of hashes

As you can imagine, hashes are quite long and (at a glance) meaningless datasets. To understand that you got the hash correctly, sometimes you need to compare it with a similar type.

On this page you will find examples of all hashes:

But you can see examples of any hash offline, without third-party resources.

You need to start by finding out how your format is correctly named in John the Ripper. To do this, you can find it in the full list of supported formats:

john --list=format

Examples of format names:

  • Office
  • ODF
  • ZIP
  • VNC
  • wpapsk
  • etc.

Now, to see an example of a hash, run one of the following commands, in which replace the word FORMAT with the name of the format:

john --list=format-details --format=FORMAT
john --list=format-all-details --format=FORMAT

I prefer the second version of the command, which displays more information.

For example, getting information about password properties and an example of a VNC hash:

john --list=format-all-details --format=VNC

I highlighted the hash example with a red border.

Here you can also find other interesting information – the maximum and minimum password length, whether the password is case-sensitive, and so on.

Another example – this time a hash of MS Office files:

john --list=format-all-details --format=Office

Reference for all scripts to generate hashes for John the Ripper and Hashcat

For myself, I have collected all the available information about these files. If you notice inaccuracies in my data or want to supplement them – then write in the comments to this section.

Use Ctrl+f to search this page.

Extracts hash for cracking 1Password password.


./ <1Password Agile Keychain(s) / Cloud Keychain(s)> / OnePassword.sqlite

Extract hashes from encrypted 7-Zip archives

The dependency is the Perl Compress::Raw::Lzma module. To install it on Debian, Kali Linux and derivatives:

sudo apt install libcompress-raw-lzma-perl

To install on Arch Linux, BlackArch and derivatives with pikaur:

pikaur -S perl-compress-raw-lzma


./ <7-Zip file>...

This utility extracts ADXCRYPT password hashes from IBM / Toshiba 4690 OS ADXCSOUF.DAT (better known, hence the utility name) and SHA-1 hashes from ADXEPW0F.DAT files.



JtR utility to convert native Adobe AEM (Adobe Experience Manager) hashes to existing JtR hash format.


./ <File(s)-with-Adobe-AEM-hashes> and

This script converts AIX etc/security/passw.

Usage: <FILE>

If no password is given, then will read from standard input.



./ [andOTP backup .json.aes file(s)]

Android backup files that can be created with the following command:

adb backup -f freeotp-backup.ab -apk org.fedorahosted.freeotp # valid for freeotp app


./ [Android Backup .ab file(s)]

Program for “converting” Android FDE images / disks into JtR friendly format.


./ <data partition / image> <footer partition / image>

Note: This script only works for old Android <= 4.3 disk images and only aes256/cbc-essiv:sha256 images are supported!



./ [Ansible Vault .yml file(s)]

Dump hashes of APEX.


./ <apex-hashes.txt file(s)>

Script to extract “hashes” from password protected Apple Notes databases. Typical database location: ~/Library/Group Containers/


./ [Apple Notes .sqlite files]

ArubaOS password hashing algorithm.


./ <ArubaOS hashes file>

Script to extract hash from AxCrypt encrypted file or self-decrypting binary.


./ <axxfile> [KEY-FILE]

Optional arguments:

  KEY-FILE			 path to optional key-file provided


./ [Jetico BestCrypt Containers, .jbc file(s)]

Retrieves hash from Bitcon wallets to guess password.


./ [Bitcoin/Litecoin/PRiVCY wallet (.dat) files]

You need to install the bsddb3 package, which is a dependency:

sudo pip3 install bsddb3




./bitlocker2john -i <Image of encrypted memory unit>


  -h		Show this help
  -i		Image path of encrypted memory unit encrypted with BitLocker

Script for extracting hashes from BitShares databases.


./ BitShares SQLite file(s)
./ Backup Wallet .bin file(s)
./ ~/BitShares/wallets/<wallet-name>/*.ldb file(s)

Database location: %APPDATA%\BitShares2-light\databases\file__0\{1,2…}

"Local Wallet" at for Google Chrome: ~/.config/google-chrome/Default/databases/https_wallet.bitshares.org_0

Extracting metadata:

sqlite3 Databases.db
sqlite> select * from Databases;
1|file__0|__sysdb__|System Database|4194304

Extracting hashes:

sqlite3 file__0/4
sqlite> select * from wallet;
3-openwall|{"public_name":"openwall", ..., "encryption_key":"ec4...", ...}

Utility to extract “hashes” from local data Google Chrome / Firefox / Android.

The plyvel module must be installed as a dependency (the script uses Python 2):

sudo pip2 install plyvel


./ <Bitwarden storage.js
./ com.x8bit.bitwarden_preferences.xml
./ Google Chrome's 'nngceckbap...' path

On Linux with Firefox, “storage.js” can be found at the following location: ~/.mozilla/firefox/YOUR-PROFILE/browser-extension-data/\{446900e4-71c2-419f-a6a7-df9c091e268b\}/

On Android with bitwarden 1.14.1, the “hash” can be retrieved from the following location: /data/data/com.x8bit.bitwarden/shared_prefs/com.x8bit.bitwarden_preferences.xml

Converts BKS keystores to JtR compatible format.

Usage: [options] <.bks / .uber file(s)>


  -h, --help            show this help message and exit
  -t TYPE, --type=TYPE  BKS keystore type (bks / uber)

Blockchain wallet files.


./ [blockchain wallet files]

optional arguments:

  -h, --help  show this help message and exit
  --json      is the wallet using v2 format?
  --base64    does the wallet contain only a base64 string?

This script extracts a crackable hash from the krb5 credential cache files (e.g. /tmp/krb5cc_1000).

Note: This attack method only works against MS Active Directory servers.


./ <input credential cache file>


./ /tmp/krb5cc_1000

Initial Cisco type 4 password decoder.


./ [cisco config file(s)] >>hashfile 2>>seed.txt
./john -format:md5 -wordlist:seed.txt -rules hashfile


./ cisco.config >
#!comment: Found type 7 passwords:

Because of that output, we re-run it and save stderr to its own file.

./ cisco.conf > 2>cisco.seed

./john -wo:cisco.seed -rules

Processes CRACF.TXT files (generated by the CRACF program) into a format suitable for JtR.



Retrieves hashes from Dashlane .aes and .dash files.


./ <.aes or .dash files from Dashlane for Windows Desktop / macOS>

Note: This only works with data from Windows and macOS Desktop version of Dashlane.

The required .aes files can be found inside %AppData%\Dashlane\profiles directory tree on Windows.

The required .aes files can be found inside ~/Library/Application\ Support/Dashlane/profiles/ directory tree on macOS.

deepsound2john extracts password hashes from audio files containing encrypted data steganographically embedded by DeepSound (

This method is known to work with files generated by DeepSound 2.0.

Input files must be in .wav format. Hashes can be recovered from audio files even after converting from other formats like:

ffmpeg -i INPUT output.wav

Usage: [-h] [--verbose] file [file ...]


positional arguments:

optional arguments:
  -h, --help     show this help message and exit
  --verbose, -v

Usage example:

python3 carrier.wav > hashes.txt
john hashes.txt

Retrieves hash from DiskCryptor.


./ [DiskCryptor Encrypted Device / Raw Disk Image]


./ /dev/sdb1


./ partition_image.raw

Tip: Use kpartx to access partitions within raw disk images on Linux.


kpartx -av disk_image.raw;
fdisk -l disk_image.raw;
./ /dev/mapper/loop0p1

ATTENTION: Cascaded ciphers are NOT supported yet!

dmg2john and

Apple Disk Samples (DMG).


dmg2john [DMG files]

1. Run dmg2john on the .dmg file (s).

For example:

./dmg2john test.dmg > hash

2. Run john on the dmg2john output.

For example:

./john hash

You can use any file of your choice: dmg2john or, but dmg2john is recommended.

The program uses Python 2.

Usage: [-h] [-S SID] [-mk MASTERKEY] [-d]
                       [-c {domain,domain1607+,domain1607-,local}]
                       [-P PREFERRED] [--password PASSWORD]

Optional arguments:

  -h, --help            show this help message and exit
  -S SID, --sid SID     SID of account owning the masterkey file.
  -mk MASTERKEY, --masterkey MASTERKEY
                        masterkey file (usually in %APPDATA%\Protect\<SID>).
  -d, --debug
  -c {domain,domain1607+,domain1607-,local}, --context {domain,domain1607+,domain1607-,local}
                        context of user account. 1607 refers to Windows 10
                        1607 update.
                        'Preferred' file containing GUID of masterkey file in
                        use (usually in %APPDATA%\Protect\<SID>). Cannot be
                        used with any other command.
  --password PASSWORD   password to decrypt masterkey file.



./eapmd5tojohn -r <pcap file>

UPD: this script may have been removed.

Encrypting File System (EFS) is a data encryption system that implements file-level encryption in Microsoft Windows NT operating systems.

For additional functionality, it is recommended to install the python-m2crypto package:

sudo apt install python-m2crypto

Usage: --masterkey=samples/openwall.efs/92573301-74fa-4e55-bd38-86fc558fa25e --sid="S-1-5-21-1482476501-1659004503-725345543-1003" --masterkey=samples/openwall.efs.2/21d67870-8257-49e0-b2de-c58324271c42 --sid="S-1-5-21-1482476501-1659004503-725345543-1005" --masterkey=samples/Win-2012-non-DC/1b52eb4f-440f-479e-b84a-654fdccad797 --sid="S-1-5-21-689418962-3671548705-686489014-1001" --password="openwall@123"

Extract hashes from files created by the command:

ejabberdctl dump output.txt

parsimonious module is required dependency, to install it type:

sudo pip install parsimonious


./ [file(s) generated by 'ejabberdctl dump' command]

Generates a hash of the Ethereum crypto wallet file.


./ [Ethereum Wallet files (default_wallet)]

The utility processes EncFS files into a format suitable for use with JtR.


./ <EncFS folder>

Retrieves hashes from Enpass Password Manager version 6.x databases.


./ <Enpass .enpassdb files>

Retrieves hashes from Enpass Password Manager version 5.x databases.


./ <Enpass .enpassdb files>

Retrieves hash from Ethereum Wallets (Geth / Mist / MyEtherWallet).


./ [Ethereum Wallet files (Geth/Mist/MyEtherWallet)]

Retrieves hashes from “FileZilla Server.xml” files.


./ <FileZilla Server.xml file(s)>



./ [disk image]


Utility to prepare for cracking private (secret) PGP Desktop / OpenPGP / GnuPG key.

PGP (English Pretty Good Privacy) is a computer program, also a library of functions that allows you to perform encryption and digital signature of messages, files and other information presented in electronic form, including transparent data encryption on storage devices, for example, on a hard disk.


./gpg2john [-d] [-S] <GPG Secret Key File(s)>
  • if -d is used, then debugging of the object types decoded is written
  • if -S is used, then subkeys will also be output


HCCAP is a custom format specially designed for oclHashcat.

The data itself does not differ from the usual tcpdump format. In fact, they are exactly the same. They are just reorganized a little.

A valid hashcat cap file (file extension: .hccap) contains one or more instances of the structure.


./hccap2john <hccap and/or hccapx file[s]>

hccapx2john, process hccapx file into a format suitable for use with JtR.

Usage: [-h] [-nc NC] [--no-mp] hccapx


positional arguments:
  hccapx      hccapx file to process

optional arguments:
  -h, --help  show this help message and exit
  -nc NC      AP nonce correction to be used, 0 to disable, default 8
  --no-mp     disable message_pair BE/LE/nc detection

This utility processes htdigest files into a format suitable for use with JtR.


./ <htdigest file(s)>

Converts files in the userid:hash format (for example, files created by an older version of the ibmiscanner tool) to the as400-sha format, which can be processed by JtR. Multiple files can be specified.

The output is sent to stdout. Use standard output redirection to generate the JtR file.


python2 ./ file [file ...]

Processes ike-scan output files in a format suitable for use with JtR.


./ <psk-parameters-file> [norteluser]

Script generate the hash to brute-force IOS 7 security PIN.

Input example (with


Output example:


1. Get the file from your phone. How to do this is outside of this document, just google it.

2. Run ios7tojohn on this file, Redirect the output to another file. For instance:

./ios7tojohn > ioshash

3. Run john on a new file using only four digits (this is a PIN code):

./john ioshash -inc:digits -min-len=4 -max-len=4

4. Hacking will take half a second. And not because Apple uses a very poor hash mechanism, but because the PIN code space is extremely small.

Generates a hash for cracking IOS backups.

Explanation of the output format:

1.all binary data is output in hexadecimal form fact, there are 2 formats, one for IOS backups < 10.0 and one for backups starting from 10.x

Hashes of versions lower than 10:


Hashes of versions higher than 10.x:



./ <Manifest.plist file>...

Generates a hash for cracking iWork files.


./ [.key files]

Kdcdump patch output translation for JtR.


./ [dump]


Generate hashes for cracking master password from KeePass password managers and forks.


./keepass2john [-k ] <DATABASES .kdbx>

Reworks Mac OS X keychain files into John the Ripper-friendly format.


keychain2john [keychain files]

Hack GNOME Keyring files, converts Gnome Keyring files to john format.


python2 [-h] KEYRING_FILE


positional arguments:
  KEYRING_FILE  Input Gnome Keyring file

optional arguments:
  -h, --help    show this help message and exit

Currently, only Sun “JKS” files are supported.


./ <.keystore / .jks file(s)>

Retrieves Kerberos tickets from the kirbi file and parses them to JtR format.


./ exported mimikatz kerberos tickets
./ output

Processes known_hosts files in a format suitable for use with JtR.


python2 ./ [known_hosts files]

This file used to be called

Retrieves AS-REQ and TGS-REP hashes.


./ <.pdml files>

To create .pdml files using tshark:

tshark -r sample.pcap -T pdml > sample.pdml; ./ sample.pdml

Examples of usage. To extract the hashes “AS-REQ (krb-as-req)”:

tshark -r AD-capture-2.pcapng -T pdml > data.pdml
tshark -2 -r test.pcap -R "tcp.dstport==88 or udp.dstport==88" -T pdml >> data.pdml
./run/ data.pdml

To extract the “TGS-REP (krb-tgs-rep)” hashes:

tshark -2 -r test.pcap -R "tcp.srcport==88 or udp.srcport==88" -T pdml >> data.pdml
./run/ data.pdml

Retrieves the KWALLET hash.


./ <.kwl file(s)>

This script converts LastPass input into a format suitable for JtR.

Output format:


The file “*_key.itr” just contains the number of calculations (eg 5000). For Firefox on Linux, this file is located in the ~/.lastpass directory.

Read before using this script on data from the Windows version of LastPass. Remember that on Windows, CryptProtectData is used to further encrypt data, so this encryption won't work out of the box. For Windows version of LastPass, additional processing (decryption) of data is required.

This script only works for LastPass 3.x for Firefox. The last supported version is LastPass is 3.3.4, released on March 17, 2017.

Older versions of LastPass can be installed from the following link

LastPass version 4.x uses a very different mechanism that is not yet supported.

It stores data in the following location: ~/.mozilla/firefox/<profile>/storage/permanent/index…/idb/<something>lp.sqlite

Also interesting:


./ <email address> <LastPass *_lpall.slps file> <LastPass *_key.itr file>

OR for lastpass-cli:

./ <path to .local/share/lpass directory>

The utility processes OpenOffice / LibreOffice files into a format suitable for JtR.

This utility was previously called

Output format:

filename:$odf*cipher type*checksum type*iterations*key-size*checksum*iv length*iv*salt length*salt*unused*content.xml data


./ <OpenOffice / LibreOffice files>

This script converts Apple OS X Lion plist file to “shadow” format compatible with John the Ripper.

The Data::Plist module must be installed as a dependency.

To do this, use any of the following methods:

1. CPAN shell:

perl -MCPAN -e shell
install Data::Plist


cpanm Data::Plist


./ <plist file> ...

Retrieves SHA-512 salted hashes from Mac OS X 10.7 Lion.

The Data::Plist module must be installed as a dependency.

To do this, use any of the following methods:

1. CPAN shell:

perl -MCPAN -e shell
install Data::Plist


cpanm Data::Plist



Generates a hash for Lotus Notes.


./ [Lotus Notes ID file(s)]

Generates a hash for cracking LUKS password.


./ [LUKS file(s) / disk(s)]

This program helps in extracting password hashes from OS X / macOS systems (>= Mountain Lion -> 10.8+).

Run this program against .plist file(s) obtained from /var/db/dslocal/nodes/Default/users/<username>.plist location.


./ <OS X / macOS .plist files>

This program helps in extracting password hashes from OS X / macOS systems (>= Mountain Lion -> 10.8+).

Run this program against .plist file(s) obtained from /var/db/dslocal/nodes/Default/users/<username>.plist location.


./ <OS X / macOS .plist files>

Converts McAfee ePO password files to John format.

ePO configuration is stored in the database server. Authentication can be based on AD or SHA1 hash stored in the database.

This script converts the CSV output of the dbo.OrionUsers table to the format for john.

The CSV output must at least match the following schema:

   - column #1 -> Name   (not really used)
   - column #2 -> AuthURI
   - column separator must be "," 


cat orion_users.csv     # (extracted from dbo.OrionUsers)


 system,auth:pwd?pwd=kDv1oBRuGOU3MnpIDbyBJEmJZ%2FauS1zf  <-- SHA1 based
 adminepo,auth:ntlm?domain=XYZ&user=adminepo             <-- AD based      

Hash generation and attack launch:

./ orion_users.csv > orion_hashes.txt

john -single orion_hashes.txt
 Loaded 1 password hashes with 1 different salts (dynamic_24 [sha1($p.$s) 128/128 AVX 10x4x1])
 Press 'q' or Ctrl-C to abort, almost any other key for status
 system           (system)         


./ [dbo.OrionUsers CSV extracts]

Retrieves hashes from Monero databases.


./ [Monero .keys file(s)]

WARNING: Only modern (> January, 2016) Monero JSON wallets are supported!

Generates a hash from MS Money files.


./ [MS Money 2002-2007 / Money Plus file(s)]


Retrieves hashes from Mongo databases.


mongo admin mongodb2john.js
mongo [hostname]:[port]/[database_name] mongodb2john.js

Mozilla Database Password Cracker Assistant (key3.db password master).

Mozilla stores credentials in the signons.sqlite file using base64 encoding, 3DES in CBC encryption mode, and standard block alignment. The decryption key is stored in the key3.db file whose entries are encrypted with a master password.

To check the master password, decrypt the password-check entry and it should be equal to the fixed string “check-password\x00\x00”.


mozilla2john [FILES key3.db]

Generates a hash for cracking MultiBit Classic and HD wallets.


./ [MultiBit Classic or HD wallets files (.key, mbhd.wallet.aes, .wallet)]

MultiBit Classic -> for a wallet named 'xyz', we need the xyz-data/key-backup/xyz*.key OR xyz-data/wallet-backup/xyz*.wallet file.

It seems the utility generates hash from the Neo Blockchain wallet, but there is no documentation.


./ [.db3 files]


Extracts from .pcap files:

  • Hashes RADIUS CHAP
  • RADIUS authentication hashes
  • EAP-MD5 hashes
  • SNMPv3 USM hashes
  • DHCPv6 authentication hashes
  • DHCPv4 authentication hashes
  • ISCSI CHAP hashes
  • DHCP OMAPI hashes

To work, you need Wireshark with Lua enabled.


tshark -q -Xlua_script:network2john.lua -r selected.pcap

Use this for development:

tshark -r selected.pcap -T pdml > data.pdml

Extracts hash from MS Office files for cracking in John the Ripp. Supported files MS Office 2003/2007/2010/2013.

olefile (formerly OleFileIO_PL), version 0.42 2015-01-25. A module for reading / writing Microsoft OLE2 files (also called structured storage or Microsoft compound document file format) such as Microsoft Office 97-2003 documents, Image Composer and FlashPix files, Outlook messages, …


./ <encrypted Office file(s)>

In OpenBSD 6.1, softraid crypto switched to bcrypt PBKDF instead of PKCS5 PBKDF2.

./openbsd_softraid2john [disk image]

This utility helps in cracking files encrypted using "openssl enc" command.

openssl aes-256-cbc -in secret.txt -out secret.txt.enc
openssl aes-256-cbc -a -in secret.txt -out secret.txt.enc
openssl enc -aes-256-cbc -in secret.txt -out secret.txt.enc


./ [-c cipher] [-m md] [-p plaintext] [-a ascii_pct] <OpenSSL encrypted files>

cipher can be: 0 => aes-256-cbc, 1 => aes-128-cbc

md can be: 0 => md5, 1 => sha1, 2 => sha256

ascii_pct: minimum ascii percent (1-100) on decrypted output (ignored if plaintext present)

OpenSSL 1.1.0e uses aes-256-cbc with sha256.

Extracts hashes for the Padlock Android cracking.


./ [Padblock file(s)]

Combines several pcap conversion utilities.


python2 ./ [.pcap files]

Extracts hash from encrypted PDF files.

Usage: <.pdf file(s)>

Generating hashes from .pem files using the PCKS #8 format.


./ <.pem files using PCKS #8 format>

Generate a hash to crack password-protected PKCS12 files.


./ <.pfx file(s)>

It generates hashes for PGP Virtual Disk FILE (s) .pgd.


./ [PGP Virtual Disk .pgd file(s)]

Calculates a hash for cracking self-decrypting archive (SDA), Symantec Encryption Desktop (SED) PGP archive files.


./ [PGP self-decrypting archive (SDA) file(s)]

Retrieves a hash from fully encrypted PGP WDE / Symantec Encryption Destop disk images.


./ [PGP WDE / Symantec Encryption Destop encrypted whole disk images]


./ hdd.raw


./ /dev/sdb

Extracts hashes from Prosody IM's .dat files which can be found under the /var/lib/prosody/<domain>/accounts location.


./ [prosody .dat files]

This script can be used to parse PSE files and extract encrypted material and data in a format that John the Ripper or other cracking tools can use to look for the decryption PIN.


python2 ./ <.pse file(s)>

Parser Oracle PS_TOKEN token.


python2 [-h] -c COOKIE


  -h, --help  show this help message and exit
  -c COOKIE   Set a victim's PS_TOKEN cookie for parsing


Key types supported: RSA, DSA, ECDSA, ED25519


putty2john [.ppk PuTTY-Private-Key-File(s)]

Processes Password Safe files and generates a JtR cracking hash.


./ [.psafe3 files]



./racf2john [RACF binary files]

Utility to extract hash and brute force RADIUS shared-secret.

The Net::Pcap module must be installed as a dependency.

In Debian, Kali Linux and their derivatives, this is done with the command:

sudo apt install libnet-pcap-perl

On Arch Linux, BlackArch and their derivatives, this can be done with the command:

sudo pacman -S perl-net-pcap

A number of PERL modules are also required, to install them in any system run:

perl -MCPAN -e shell
install CPAN::DistnameInfo
install NetPacket::IP
install Net::Radius::Dictionary


./ <pcap FILES>

Utility to extract hash and brute force RADIUS shared-secret.


./ <pcap files>


Retrieves hash from encrypted RAR archives.


./rar2john <rar file(s)>

The -v option increases the verbosity of the output.

Output string format:

For type = 0 for files encrypted with the "rar -hp …" option


For type = 1 for files encrypted with the "rar -p …" option



archive_name:$RAR3$*type*hex(salt)*hex(crc)*PACK_SIZE*UNP_SIZE*1*hex(full encrypted file)*method:type::file_name

This Perl script converts password hashes downloaded from SAP systems into a format suitable for John the Ripper (outputs to stdout).


./ <input-file> [A|B|D|E|F|H]

To read from standard input:

./ - [A|B|D|E|F|H]

A detailed description of the options is given in the source code of the script.

Hash extraction for cracking the Signal messenger password.

Modern versions of Signal do not support passphrase.

The script has only been tested with Signal 4.13.5.

Run with the file /data/data/org.thoughtcrime.securesms/shared_prefs/SecureSMS-Preferences.xml.

In the modern version of the Signal Android app (e.g. 4.19.3), the screen lock code is stored as clear text in the SecureSMS-Preferences.xml file!


./ [SecureSMS-Preferences.xml files]

Processes sipdump output files (dump files) into a format suitable for use with JtR.


./ <sipdump dump files>

Retrieves hashes from RSA/DSA/EC/OpenSSH private keys.


./ <RSA/DSA/EC/OpenSSH private key file(s)>

Utility to retrieve NetIQ SSPR hashes from a LDAP server.

Usage: [-h] -H HOST [-p PORT] -b BASEDN [-s] [-D BINDDN] [-w PASSWORD]

Optional arguments:

  -h, --help            show this help message and exit
  -H HOST, --host HOST  Format like or
  -p PORT, --port PORT  Format like 389 or 636
  -b BASEDN, --basedn BASEDN
                        Format like CN=Users,DC=EXAMPLE,DC=NET
  -s, --secure          Use LDAPS (LDAP OVER SSL), recommended
  -D BINDDN, --binddn BINDDN
                        Format like CN=<username>,CN=Users,DC=EXAMPLE,DC=NET or
  -w PASSWORD, --password PASSWORD
                        Password for LDAP bind

The utility converts StarOffice files into a format suitable for use with JtR.

This utility was previously called


./ <StarOffice files (.sxc, .sdw, .sxd, .sxw, .sxi)>

Processes STRIP files into a suitable format for use with JtR.

Output format:



./ <STRIP files>

A utility for extracting "hashes" from the userconfing.xml file(s) of the Telegram Android application and from the file (map) of the Telegram Desktop local storage.


./ <userconfing.xml file(s) / <path to Telegram data directory>

Example (Linux):

./ ~/.local/share/TelegramDesktop

Example (Windows):

./ "C:/Users/Name/AppData/Roaming/Telegram Desktop" (and

Creates Tezos File For John The Ripper.


./ 'mnemonic data (15 words)' 'email' 'public key'

Usage 2: [-h] [-i] [-I]


  -h, --help            show this help message and exit
  -i, --ignoreRules, --ignorerules
                        Ignore All Rules, seed words, checksum, ...
  -I, --ignoreICORules, --ignoreicorules
                        Do Not Check To See If It Is A Valid ICO Format (15 seed words)


./ 'put guide flat machine express cave hello connect stay local spike ski romance express brass' '' 'tz1eTjPtwYjdcBMStwVdEcwY2YE3th1bXyMR'

Utility to import TrueCrypt volume to a format crackeable by John The Ripper


./ [-b] volume_filename [keyfiles(s)]> output_file


  -h, --help  show this help message and exit

Enable -b only when attacking TrueCrypt's boot mode.



uaf2john uaf_file

Converts *.vbox files (which contain the encryption information of the associated *.vdi file) to the correct format for JtR processing.

Reads data from STDIN.


./ [.vmx files]


Extract hashes from files with VNC session handshake for password cracking in John the Ripper.


./vncpcap2john <pcapfiles>


Converts PCAP or IVS2 files to JtR format.

Supported encapsulations: 802.11, Prism, Radiotap, PPI and TZSP over UDP.


./wpapcap2john [ОПЦИИ] FILE(S)


-c		Show only complete auths (incomplete ones might be wrong passwords
		but we can crack what passwords were tried).
-v		Bump verbosity (can be used several times, try -vv)
-d		Do not suppress dupe hashes (per AP/STA pair)
-r		Ignore replay-count (may output fuzzed-anonce handshakes)
-f <n>		Force anonce fuzzing with +/- <n>
-e <essid:mac>	Manually add Name:MAC pair(s) in case the file lacks beacons.
		eg. -e "Magnum WIFI:6d:61:67:6e:75:6d"
-m <mac>	Ignore any packets not involving this mac adress


./ [zed archives]


Extract hash from encrypted ZIP archives for password cracking in John the Ripper.


./zip2john [options] [zip file(s)]


 -s Scan archive from the beginning, looking for local file headers. This
    is less reliable than going by the central index, but might work better
    with corrupted or split archives.

Options for 'old' PKZIP encrypted files only:

 -a <filename>   This is a 'known' ASCII file. This can be faster, IF all
    files are larger, and you KNOW that at least one of them starts out as
    'pure' ASCII data.
 -o <filename>   Only use this file from the .zip file.
 -c This will create a 'checksum only' hash.  If there are many encrypted
    files in the .zip file, then this may be an option, and there will be
    enough data that false positives will not be seen.  If the .zip is 2
    byte checksums, and there are 3 or more of them, then we have 48 bits
    knowledge, which 'may' be enough to crack the password, without having
    to force the user to have the .zip file present.
 -m Use "file magic" as known-plain if applicable. This can be faster but
    not 100% safe in all situations.
 -2 Force 2 byte checksum computation.

Other utilities to extract hashes


hcxtools is a small set of tools for converting captured Wi-Fi packets. Able to convert between different formats and hashes for use with the latest versions of hashcat or John the Ripper.

The following hash modes are supported for John the Ripper: WPAPSK-PMK, PBKDF2-HMAC-SHA1, chap, netntlm, tacacs-plus


hcxkeys is a small toolbox for generating plainmasterkeys rainbow tables (for cracking Wi-Fi) and hashes for use with the latest hashcat and the latest John the Ripper.

What you need to know when posting hashes

It is considered unethical (perhaps even illegal in some countries) to publish someone else's hashes, since decrypting them means obtaining a password and possible leakage of personal data.

You also need to understand that decrypting some hashes means getting a private key. For example, if you published a hash from a Bitcoin wallet and someone decrypted it, then a third party can manage your wallet, including transferring money.

Recommended for you:

Leave a Reply

Your email address will not be published.