On 2015-12-03, Oleksandr Gavenko wrote:

> Package: john
> Version: 1.8.0-2
> Severity: normal
>
> I trapped into same issue as described at:
>
>   
> http://www.governmentsecurity.org/forum/topic/33177-john-the-ripper-and-md5-hashes/
>
> I try to audit passwords in MD5 hashes by:
>
>   $ john.exe --format=raw-md5 pass.txt
>
> and get:
>
>   Unknown ciphertext format name requested
>
> Note that upstream provide officially signed sources of so called
> "community-enhanced version" named "jumbo" at main page:
>
>   http://openwall.com/john/
>
> with a lot of enhancement like NTLM, raw MD5, etc.
>
For those who can't wait for "jumbo" patch:

  $ /etc/apt/sources.list.d/kali.list
  deb [arch=amd64] http://http.kali.org/kali kali-current main contrib non-free

  $ cat /etc/apt/preferences.d/kali
  Package: *
  Pin: release o=Kali
  Pin-Priority: 50

  $ sudo apt-get update

  $ apt-cache policy john
  john:
    Installed: 1.8.0.6-jumbo-1-0kali2
    Candidate: 1.8.0.6-jumbo-1-0kali2
    Version table:
   *** 1.8.0.6-jumbo-1-0kali2 0
           50 http://http.kali.org/kali/ kali-current/main amd64 Packages
          100 /var/lib/dpkg/status
       1.8.0-2 0
          400 http://ftp.us.debian.org/debian/ testing/main amd64 Packages
          200 http://ftp.us.debian.org/debian/ unstable/main amd64 Packages

According to:

  http://docs.kali.org/policy/kali-linux-relationship-with-debian

    Kali intends to contribute those packages back to Debian and to maintain
    them directly within Debian.

it is possible to contact to Kali developers for backposting improvements.

-- 
Best regards!

Reply via email to