#Make john friendly file
rar2john keys.rar > jail
./zip2john test.zip > zip.hashes
john jail
john --wordlist=/usr/share/wordlists/rockyou.txt hash_file
john zip.hashes
#7z file. In order to crack the password with John
#we first need to convert it to JtR format using the 7z2john script.
/usr/share/john/7z2john.pl backup.7z > backup-john.txt
john --wordlist=rockyou.txt backup-john.txt
fcrackzip -u -D -p /usr/share/wordlists/rockyou.txt data.zip
#LDAP
john --wordlist=/usr/share/wordlists/rockyou.txt hashes.txt
#Excel files
python2 /usr/share/john/office2john.py
john --rules --wordlist=yourwordlist.txt hash.txt
From KeePass
Clue: .kdbx Extension
Represents an encrypted data store for a password manager program named KeePass.
keepass2john utility could extract a password hash from this file
Load John The Ripper
keepass2john CEH.kdbx > CEHjohnable
john CEHjohnable -w:/usr/share/wordlists/rockyou.txt
./hashcat -m 13400 hash.keepass rockyou.txt
#Open using open keepassx/keepass2
SSH-Keys
locate ssh2john.py
ssh2john.py id_rsa > id_rsa.hsh
john id_rsa.hash -w=wordlist.txt