Forrest logo
back to the john tool

john:tldr:3bb50

john: Display users' cracked passwords by user identifier from multiple files.
$ john --show --users=${user_ids} ${path-to-hashes*} ${path-to-other-hashes*}
try on your machine

This command is using the "john" program to display password hashes and their associated usernames for a specified list of users.

Here is a breakdown of the command:

  • "john" is the name of the program that is being executed. It is commonly used for password cracking and hash analysis.
  • "--show" is an option/command-line flag that tells the "john" program to display the cracked passwords in a human-readable format.
  • "--users=${user_ids}" is another option that specifies the user IDs for which password hashes should be displayed. The "${user_ids}" is a variable placeholder that needs to be replaced with the actual user IDs you want to analyze.
  • "${path-to-hashes}" and "${path-to-other-hashes}" are also variables that represent the paths to the files containing password hashes. The "* " part implies that the specified paths can be multiple files or a wildcard pattern representing multiple files.

To use this command effectively, you would replace "${user_ids}" with the desired user IDs and "${path-to-hashes}" and "${path-to-other-hashes}" with the actual paths to the files containing the password hashes you want to analyze.

This explanation was created by an AI. In most cases those are correct. But please always be careful and never run a command you are not sure if it is safe.
back to the john tool