To give you an idea of how John the Ripper works, we will take the example of the Single Mode since it is the simplest of all. Our system generally has to mark them one by one and modify them. One of the modes we have found most interesting is the one that bets on looking for the most insecure passwords. One of the main differences between John the Ripper and other similar programs is that it uses brute force to guess different passwords and has many other methods to obtain information. In its most noble use, this is an ideal option if you have doubts about the security of a password because if this program can unlock it, it is weak. Although they often seem insignificant, they can end up causing damage. With this cryptographic application, we can recover passwords from the different data around the system.
Many consider that proactive tools, i.e., specially developed to defend against attacks, are more secure. You have to bear in mind, however, that when we use this program for such purposes, we are using a reactive platform, which, as we said before, we use for a purpose that is often different from the usual one.