Skip to main content

All Questions

Tagged with
0 votes
1 answer
2k views

How does john the ripper crack ssh private key passphrases?

How does John The Ripper work when trying to crack passphrase of a private ssh key? What steps are involved when it tries to do so? What's the role of ssh2john in the whole process?
sec_test19's user avatar