

Lrwxrwxrwx 1 root root 4 Aug 16 17:00 unique -> john Lrwxrwxrwx 1 root root 4 Aug 16 17:00 undrop -> john Lrwxrwxrwx 1 root root 4 Aug 16 17:00 unafs -> john rwxr-xr-x 1 root root 9080 Aug 16 17:00 tgtsnarf Lrwxrwxrwx 1 root root 4 Aug 16 17:00 ssh2john -> john Lrwxrwxrwx 1 root root 4 Aug 16 17:00 rar2john -> john Lrwxrwxrwx 1 root root 4 Aug 16 17:00 racf2john -> john Lrwxrwxrwx 1 root root 4 Aug 16 17:00 pwsafe2john -> john Lrwxrwxrwx 1 root root 4 Aug 16 17:00 pdf2john -> john rwxr-xr-x 1 root root 7736 Aug 16 17:00 mkvcalcproba Lrwxrwxrwx 1 root root 4 Aug 16 17:00 keychain2john -> john Lrwxrwxrwx 1 root root 4 Aug 16 17:00 keepass2john -> john rw- 1 root root 25902 john.bash_completion Lrwxrwxrwx 1 root root 4 Aug 16 17:00 hccap2john -> john rwxr-xr-x 1 root root 23408 Aug 16 17:00 genmkvpwd rwxr-xr-x 1 root root 8736 Aug 16 17:00 calc_stat Now that you've finished building everything, all your binary tools will be in the run directory: Make sure you have LibSSL headers installed: if you don't have it (if you're using John the Ripper as part of a package manager, that doesn't build it), it's ok, you can just make a local build of John and use the tool from there.

Now you'll need to use hccap2john, a tool that comes with John the Ripper. Run make and it will make a tool called cap2hccap.bin, which you will then run as an executable.Ĭall the bin file, pass it your cap file, then tell it where to output the hccap file:

You can convert airodump-ng pcap files into a format that John can understand using the following steps :įirst, you'll need to convert the pcap to a hashcat pcap (hccap) file, using cap2hccap tool: ĭownload it, and unzip it to a directory.
