Provided by: john_1.8.0-2build1_amd64 bug

NAME

       unshadow - combines passwd and shadow files

SYNOPSIS

       unshadow password-file shadow-file

DESCRIPTION

       This  manual page documents briefly the unshadow command, which is part of the john package.  This manual
       page was written for the Debian GNU/Linux distribution because the  original  program  does  not  have  a
       manual  page.   john,  better  known  as  John the Ripper, is a tool to find weak passwords of users in a
       server.

       The unshadow tool combines the passwd and shadow files so John can use them. You might need this since if
       you  only  used  your shadow file, the GECOS information wouldn't be used by the "single crack" mode, and
       also you wouldn't be able to use the '-shells' option. On a normal system you'll need to run unshadow  as
       root to be able to read the shadow file.

SEE ALSO

       john(8), mailer(8), unafs(8), unique(8).

       The   programs   are   documented   fully   by   John's  documentation,  which  should  be  available  in
       /usr/share/doc/john or other location, depending on your system.

AUTHOR

       This manual page was written by Jordi Mallach <jordi@debian.org>, for the Debian  GNU/Linux  system  (but
       may be used by others).
       John  the  Ripper  and  mailer  were written by Solar Designer <solar@openwall.com>. The complete list of
       contributors can be found in the CREDITS file in the documentation directory.