John the Ripper vs. Nikto

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
John the Ripper
Score 8.0 out of 10
N/A
John the Ripper is a penetration testing tool used to find and crack weak passwords.N/A
Nikto
Score 10.0 out of 10
N/A
Nikto is an open source fast (not stealthy) vulnerability testing tool that can be used in penetration testing or purple team exercises.N/A
Pricing
John the RipperNikto
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
John the RipperNikto
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details——
More Pricing Information
Best Alternatives
John the RipperNikto
Small Businesses

No answers on this topic

No answers on this topic

Medium-sized Companies
Veracode
Veracode
Score 8.5 out of 10
Veracode
Veracode
Score 8.5 out of 10
Enterprises
Veracode
Veracode
Score 8.5 out of 10
Veracode
Veracode
Score 8.5 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
John the RipperNikto
Likelihood to Recommend
9.0
(1 ratings)
10.0
(1 ratings)
User Testimonials
John the RipperNikto
Likelihood to Recommend
Open Source
It is best suited in those environments where complexity is not the key. We've used it fairly extensively in our UNIX to find weak UNIX passwords and in Windows environments too. It's very easy to get hold of as it is essentially Open Source, although a paid version is now available and we are thinking of looking at this proposition in-depth to see if it is viable. We found it easy to install and deploy across our systems. Patching was fairly regular, so we always had the latest version. It holds its own against DES and Blowfish encryption algorithms among many others.
Read full review
Open Source
Nikto is well suited for scanning web server-related vulnerabilities for small and medium enterprises. We can utilise it for checking server default files and security misconfigurations. It is not suited well for some users because it is CLI based tool and not a GUI based. Also, community and OEM support are not available for this tool.
Read full review
Pros
Open Source
  • Easily finds plantect passwords.
  • Simply detects passwords hashes.
  • Has a fully bespoke cracker that can be modified to users requirements.
  • Excellent for UNIX and Windows usage.
Read full review
Open Source
  • Well known tool
  • Source code available
  • Wweb server vulnerability scanner
Read full review
Cons
Open Source
  • It needs to be modified to be able to break SHA 256, 512 and the lastest hashes.
  • Can be slow and wildly against the lastest hashes.
  • Require admin access to set up account.
  • Old and is being superseded by better applications.
Read full review
Open Source
  • Can be made GUI based for ease of users
  • User community should be there
  • Development and support should be available
Read full review
Alternatives Considered
Open Source
'John the Ripper' being open source was free to use, whereas the others had to be paid for. It was very simple to install and runs against many hundreds of hashes and crypts. It is always developing thanks to large communities on GitHub.
Read full review
Open Source
No answers on this topic
Return on Investment
Open Source
  • Helped us achieve initial Password Auditor goals and targets.
  • Simple and cheap to deploy, so have saved greatly compared to paid for products.
Read full review
Open Source
  • Improved security posture of organisation.
  • Improved in regulatory and corporate compliance.
  • Easy to use result in adaptation of this tool by business users.
Read full review
ScreenShots