compatible with Nvidia CUDA and OpenCL (not for all algorithms).The current version features a hybrid attack mode (bruteforce and dictionary-based key matching).Listening passwords to archives, WiFi access points.And after that the program will pick up their passwords. That means you can not copy all information from the LAN, but just get a log file listing all hash sums of the detected files on the server (which takes less time). That's why it is widely used for 'quick' looting of the protected local network. One of the key advantages of John The Ripper is that it is able to calculate a hash and outline it.
Currently, the software supports over 260 key matching algorithms, working both in the brute-force mode and with user dictionaries. Program featuresJohn The Ripper for Windows is used for recovering passwords by their hash sum. There is a cross-platform GUI for the program, including a Russian-language one, but the GUI is installed as a separate application. It works via the terminal, so it is possible to run it on Android as well (via Andrax or Kali NetHunter). It was originally created for Linux systems, but it can be compiled for almost any actual operating system.
John The Ripper is a free open-source utility (GNU license) for recovering (cracking) passwords using their hashes.