Community packages of John the Ripper, the auditing tool and advanced offline password cracker (Docker images, Windows PortableApp, Mac OS, Flatpak, and Ubuntu SNAP packages)
1. Is your feature request related to a problem? Please describe
Some john installation tutorial that is popular on the internet [1] created a method for installing john by downloading packages from john-packages (specially the Windows .7z file).
This is very good:
However, this tutorial seems to be highlighting the bleeding version when the latest version (currently 1.9J1+2404) should be the most recommended for this.
Still, it seems that there is automation in this process. So, we would like to recommend that the person adds validation and printing of file hashes to the "installer" in order to add reliability and transparency to the process.
[1] There are hundreds of downloads per day of the Windows .7z package. These numbers are not reflected in access to the repository, that is, these people do not have access to our quality controls (checksums/attestations).
2. Describe the solution you'd like
I would like to recommend that the contributor adds validation e transparency to the process.
**========== BTW ==========**
[!CAUTION]
🔍 Please use discretion when accessing sites that claim to be sources for John the Ripper download.
1. Is your feature request related to a problem? Please describe
Some
john
installation tutorial that is popular on the internet [1] created a method for installingjohn
by downloading packages fromjohn-packages
(specially the Windows.7z
file).This is very good:
bleeding
version when thelatest
version (currently 1.9J1+2404) should be the most recommended for this.[1] There are hundreds of downloads per day of the Windows
.7z
package. These numbers are not reflected in access to the repository, that is, these people do not have access to our quality controls (checksums/attestations).2. Describe the solution you'd like
I would like to recommend that the contributor adds validation e transparency to the process.