Intruder vs. John the Ripper

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Intruder
Score 8.7 out of 10
N/A
Intruder, from Intruder Systems in London, is a cloud-based vulnerability scanner that finds cyber security weaknesses in digital infrastructure, to avoid costly data breaches.
$127
per month 1 infrastructure target
John the Ripper
Score 8.0 out of 10
N/A
John the Ripper is a penetration testing tool used to find and crack weak passwords.N/A
Pricing
IntruderJohn the Ripper
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
IntruderJohn the Ripper
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
IntruderJohn the Ripper
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
IntruderJohn the Ripper
Small Businesses
ThreatDown, powered by Malwarebytes
ThreatDown, powered by Malwarebytes
Score 8.7 out of 10

No answers on this topic

Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Veracode
Veracode
Score 8.5 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Veracode
Veracode
Score 8.5 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
IntruderJohn the Ripper
Likelihood to Recommend
9.0
(1 ratings)
9.0
(1 ratings)
User Testimonials
IntruderJohn the Ripper
Likelihood to Recommend
Intruder Systems
When the infrastructure landscape and risk profile is not well known and is legacy, Intruder can scan and automate reporting on open security risks, as well as coordinate responses.
Read full review
Open Source
It is best suited in those environments where complexity is not the key. We've used it fairly extensively in our UNIX to find weak UNIX passwords and in Windows environments too. It's very easy to get hold of as it is essentially Open Source, although a paid version is now available and we are thinking of looking at this proposition in-depth to see if it is viable. We found it easy to install and deploy across our systems. Patching was fairly regular, so we always had the latest version. It holds its own against DES and Blowfish encryption algorithms among many others.
Read full review
Pros
Intruder Systems
  • Auto scanning.
  • New vulnerability detection.
  • Alert levels.
Read full review
Open Source
  • Easily finds plantect passwords.
  • Simply detects passwords hashes.
  • Has a fully bespoke cracker that can be modified to users requirements.
  • Excellent for UNIX and Windows usage.
Read full review
Cons
Intruder Systems
  • Reports could contain more detail.
Read full review
Open Source
  • It needs to be modified to be able to break SHA 256, 512 and the lastest hashes.
  • Can be slow and wildly against the lastest hashes.
  • Require admin access to set up account.
  • Old and is being superseded by better applications.
Read full review
Alternatives Considered
Intruder Systems
Intruder focuses on scanning network blocks for your servers even if you don't know which services or hostnames are running on them, unlike Detectify which requires a domain or hostname to scan. The network port scanning of Intruder is also broader than many competitors.
Read full review
Open Source
'John the Ripper' being open source was free to use, whereas the others had to be paid for. It was very simple to install and runs against many hundreds of hashes and crypts. It is always developing thanks to large communities on GitHub.
Read full review
Return on Investment
Intruder Systems
  • Improved security profile.
  • Better reporting to stakeholders and clients of the current security risks.
Read full review
Open Source
  • Helped us achieve initial Password Auditor goals and targets.
  • Simple and cheap to deploy, so have saved greatly compared to paid for products.
Read full review
ScreenShots

Intruder Screenshots

Screenshot of The Intruder dashboardScreenshot of Cloud connectorsScreenshot of Network viewScreenshot of Issues pageScreenshot of Targets page