john_the_ripper
Crack password hashes by testing combinations from wordlists against specified hash formats to identify weak credentials during security assessments.
Instructions
cracking hashes using john based on format and a wordlist
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| hashfile | Yes | ||
| format | Yes | ||
| wordlist | No | /usr/share/wordlists/rockyou.txt |
Implementation Reference
- src/pentestmcp/server.py:261-263 (handler)The handler function for the 'john_the_ripper' tool. It executes John the Ripper to crack hashes using the provided hashfile, format, and wordlist by calling the run_command helper.async def john_the_ripper(hashfile:str,format:str,wordlist:str="/usr/share/wordlists/rockyou.txt"): return run_command(["john",f"--format={format}",hashfile,f"--wordlist={wordlist}"])
- src/pentestmcp/server.py:260-260 (registration)MCP tool registration decorator for 'john_the_ripper', specifying the tool name and description.@mcp.tool(name="john_the_ripper",description="cracking hashes using john based on format and a wordlist")