I do the following:
su useradd joe passwd joe frogThat should be a simple enough password to crack. This yields the following line in /etc/shadow:
joe:$6$BF8iXyBgxapbT2d8$BmEwURiAFbhUgKfbQpb2LuAjb4YZNnh7072BSJ6dq30Ihrj0ESOxBAO34mPsFJe82rawV.By09vvVcjckkugw1:18465:0:99999:7:::I placed this one line into passwd.joe and typed:
john passwd.joe Loaded 1 password hash (crypt, generic crypt(3) [?/64]) Press 'q' or Ctrl-C to abort, almost any other key for status frog (joe) 1g 0:00:00:12 100% 2/3 0.08230g/s 454.0p/s 454.0c/s 454.0C/s ncc1701d..1022 Use the "--show" option to display all of the cracked passwords reliably Session completedThis took less than 3 seconds -- a simple dictionary word is pretty easy!
john --fork=6 passwd.femtoMy machine has 8 cores. I figure to let John use 6 of them and keep the other two for my own use while it is running. I start it going at 4:42 on July 22, 2020. In just over an hour (by 5:45), we have "orketmeg".
Tom's electronics pages / tom@mmto.org