Key | Value |
---|---|
FileName | ./usr/share/doc/john/FAQ.gz |
FileSize | 2479 |
MD5 | 9FFF3383688805C70655B130A6FCF7A3 |
SHA-1 | 553B0C5945BAFFE4124B10F14808BAF77D10EF91 |
SHA-256 | 6F76C0CBCBF7CBA9952FA239166D72D13749BD9D85F394D8626FCBE0B8CE5C08 |
SSDEEP | 48:X0Quzg4d2Y9CMH7exP7bEDUQYELnzNuIcCm/iHiEQQJmyfVpsz:Epg4YY9X7sP7bEDXLnzNj5TRhVpc |
TLSH | T1F5517D27E7D0F132DC6521ACC8596CCD201090D5B20B82A39FEA94CC1DA9C806C8635F |
hashlookup:parent-total | 1 |
hashlookup:trust | 55 |
The searched file hash is included in 1 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
FileSize | 536698 |
MD5 | FA27C007C8A1BF6F26BA4EBB814740E4 |
PackageDescription | An active password cracking tool john, normally called john the ripper, is a tool to find weak passwords of your users, and even mail them automatically if you want. . It can also be used to find weak passwords in different cyphertext formats including: Unix's DES and MD5, Kerberos AFS passwords support, Windows' LM hashes, BSDI's extended DES, and OpenBSD's Blowfish. . Homepage: http://www.openwall.com/john/ |
PackageMaintainer | Guilherme de S. Pastore <gpastore@colband.com.br> |
PackageName | john |
PackageSection | admin |
PackageVersion | 1.6-33 |
SHA-1 | 31B317B617371DBD28BAD05BE3A21653BE61D312 |
SHA-256 | 7131751D880D6B3CF78126FF2FC3480C7AD11272583653EE803F52F82BDCB48C |