Of course, the standard Kali user account information is much faster if you just run: john -format=crypt johninput So try replacing the new command line with: john -format=crypt -wordlist=/usr/share/wordlists/rockyou.txt johninput Jon seems to need help recognizing most of the hash format. If you see johninput or $y$ right after logging in, it means the passwords are actually hashed with yescrypt. I’m assuming you’ll test this tutorial on Kali yourself after successful execution of the following command: sudo unshadow /etc/passwd /etc/shadow > johninput make-charset=FILE Encoded FILE is overwritten anyway-show Show shared passwords-test run tests and benchmarks for TIME seconds each-users=LOGIN|UID stack these users only-groups=GID put users only in (these) group(s).-shells=SHELL buffer only users without this shell(s).-salts=Load N salts, not having only Nsmallest passwords-save-memory=LEVEL convince to save memory, at LEVEL 1.3-node=MIN/TOTAL This node numbers are outside the TOTAL number-fork=N forks N processes-format=NAME force NAME hash type: descrypt/bsdicrypt/md5crypt/ bcrypt/LM/AFS/tripcode/dummy/crypt $JohnPassword cracker John the Ripper, 1 Version 8.0Copyright (c) 1996-2013 Solar Designer onlyHomepage: : Account - "single crack" mode-wordlist=FILE -stdin wordlist mode, read style from FILE or stdin- Rules inspire word rules for word list mode-incremental "incremental" mode -external=MODE of external function or word filter-stdout show most recent candidate passwords -restore Return with suspended session -session=NAME Send new session to user NAME-status Show session reputation.
The carrier (in the documentation and in this configuration file for John, “$JOHN” is moved to John’s “home directory” the nature of the free information depends on how well you installed John). Cracked passwords are printed out on the terminal and saved in a file called $JOHN/john.