On 2015-12-03, Oleksandr Gavenko wrote: > Package: john > Version: 1.8.0-2 > Severity: normal > > I trapped into same issue as described at: > > > http://www.governmentsecurity.org/forum/topic/33177-john-the-ripper-and-md5-hashes/ > > I try to audit passwords in MD5 hashes by: > > $ john.exe --format=raw-md5 pass.txt > > and get: > > Unknown ciphertext format name requested > > Note that upstream provide officially signed sources of so called > "community-enhanced version" named "jumbo" at main page: > > http://openwall.com/john/ > > with a lot of enhancement like NTLM, raw MD5, etc. > For those who can't wait for "jumbo" patch:
$ /etc/apt/sources.list.d/kali.list deb [arch=amd64] http://http.kali.org/kali kali-current main contrib non-free $ cat /etc/apt/preferences.d/kali Package: * Pin: release o=Kali Pin-Priority: 50 $ sudo apt-get update $ apt-cache policy john john: Installed: 1.8.0.6-jumbo-1-0kali2 Candidate: 1.8.0.6-jumbo-1-0kali2 Version table: *** 1.8.0.6-jumbo-1-0kali2 0 50 http://http.kali.org/kali/ kali-current/main amd64 Packages 100 /var/lib/dpkg/status 1.8.0-2 0 400 http://ftp.us.debian.org/debian/ testing/main amd64 Packages 200 http://ftp.us.debian.org/debian/ unstable/main amd64 Packages According to: http://docs.kali.org/policy/kali-linux-relationship-with-debian Kali intends to contribute those packages back to Debian and to maintain them directly within Debian. it is possible to contact to Kali developers for backposting improvements. -- Best regards!