General
# Check for the format lists john --list=formats # Crack em john --format= --wordlist= hash.txt
for identifying a hash can use
hashid
or maybe look at https://hashes.com/en/tools/hash_identifier or https://www.tunnelsup.com/hash-analyzer/Custom Rule
used to exploit Password complexity predictability.
Custom rules are defined in the
john.conf
filelook at the this wiki for details: https://www.openwall.com/john/doc/RULES.shtml