Key | Value |
---|---|
FileName | ./usr/share/doc/john/FAQ.gz |
FileSize | 2479 |
MD5 | 071308481D7408B8898598C9379E460F |
SHA-1 | 4BDC47C49DC439E0C31374F8B5C216D7382CDFD6 |
SHA-256 | D966B8B53D1BE2AF0250C09D1095C0EE584A63002DB2D53A1E212BBFFFA5E761 |
SSDEEP | 48:XHHQuzg4d2Y9CMH7exP7bEDUQYELnzNuIcCm/iHiEQQJmyfVpsz:Xpg4YY9X7sP7bEDXLnzNj5TRhVpc |
TLSH | T135517D27E7D0F132CC6521ACC8596CCD2010D0D5B20B81A39FEA948C1DA9C806CC635F |
hashlookup:parent-total | 1 |
hashlookup:trust | 55 |
The searched file hash is included in 1 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
FileSize | 499290 |
MD5 | A75CD9DF663DD3FBCEDED0EB171B1C2E |
PackageDescription | An active password cracking tool john, normally called john the ripper, is a tool to find weak passwords of your users, and even mail them automatically if you want. . It can also be used to find weak passwords in different cyphertext formats including: Unix's DES and MD5, Kerberos AFS passwords support, Windows' LM hashes, BSDI's extended DES, and OpenBSD's Blowfish. . Homepage: http://www.openwall.com/john/ |
PackageMaintainer | Guilherme de S. Pastore <gpastore@colband.com.br> |
PackageName | john |
PackageSection | admin |
PackageVersion | 1.6-33 |
SHA-1 | EA94BFBF92365158203D0E2FE4298B130F8BD2F4 |
SHA-256 | A66E6A4F77068E982B761C6315F56838EF2F57946189F93EF72DF94712563C9D |