Jul 19, 2016 Part 6 shows examiners how to crack passwords with a wordlist using John the Ripper and the hashes extracted in Part 2. Practice ntds.dit File Part 6: Password Cracking With John the Ripper – Wordlist Pingback by Week 29 – 2016 – This Week In 4n6 — Sunday 24 July 2016 @ 13:14.
John The Ripper : Cracking a .DMG
Let's cut to the chase right now: Cracking encrypted disk image, AKA DMG is feasible, but, and there are many buts, is extremely, extremely time consuming. If you do not remember at all the password, or if you attempt to crack in 'blind mode', you will probably need to teach your kids how to do it: By the time you'll have a fighting chance, you'll be long dead. Step 1: Write down everything you can remember about the forgotten password, i.e what you could have used, and what you are sure not to have used, i.e. never used a space or a '@' sign. Step 1a: If you remember enough of your password, or if you are just missing trailing numbers i.e Mypassword???? >> MyPassword1234 and do not remember if it's 1234 or 4321, or 9999, Just use CrowbarDMG and a Wordlist. For good Wordlists, go here! If you need to create a specific wordlist (because you remember what you may have used and, most importantly, what you may have not used, go here and look for Wordlists On Demand) Warning!: CrowbarDMG is slow! CrowbarDMG is basically a GUI for the hdiutil command ETA for trying 9999 passwords: About 3 hrs 99,999 passwords: About 30 hrs 999,999 passwords: About 300 hrs Or 12 days .. Step 2: Do you know how to compile and use John The Ripper? I mean 'use it! including editing Rules, etc? --> No? Proceed here. Read carefully. Pause. Repeat. --> Yes! Ok, Sure? 1) Download JTR, version Bleeding Jumbo by Magnum As of Aug 2013, it's here otherwise here 2) Compile. Don't forget to edit the Makefile and John.conf. Check for CUDA and OMP/MPI RUN. Creating a new Charset? that could be wise.. 3) Run dmg2John.py to extract the hash python [path to file ]dmg2john.py [path to file] myfile.dmg > dmg.txt 4) Edit/Create your rules as needed 5) ./ John etc (Run Baby, run ..) 6) There is always Hashcat (Win/Lin) 7) Because most you have seen, in movies, Hackers cracking an AES within minutes, you'll try without thinking too much about it. It's going to leave you with a lot of time to read .. Enjoy .. 8) Without going into too much details, the use of GPU assisted is highly recommended. If you have one of those ones, you'll most likely increase your speed by a factor of 1000, sometimes 10,000 times faster.
☞ How big is 2^{128}?
☞ Password Cracking AES-256 DMGs and Epic Self-Pwnage (The Keyword here is: 25 GPU) ☞ 'If you have thought about a new cracking method, It's probably already in JtR' (Matt Weir) (Quoted liberally) ☞ 'I don't care if the NSA teams up with the KGB, a full random 15Ch long AES is practically unbreakable in a lifetime. (Matt Weir, Quoted Very Liberally, From circa 2009) EPAG: Empirical Poke-Around Graph Markov Probabilities How To Use John The Ripper To Crack Dmg File Player
Download http://www.openwall.com/john/ (John the ripper)
How to delete player.dmg in use. Locate /run folder in the john folder (you may have to compile)
Locate /run/dmg2john
$./dmg2john your_file.dmg >> output
$./john output
or
$./john --format=dmg-opencl output
How To Use John The Ripper To Crack Dmg File Free
note: this will use john's standard wordlist tries, please read john's documentation to use your own wordlists or password rules. I found that with my laptop I can get 15 tries p/s.
Brute-force dictionary program to crack dmg encrypted images.I wrote this program as the next available program was crowbarDMG.From a glance crowbar was:Single threaded.Tries to mount the drive at the same time.Runs about .8 passwords per second. (256bit encryption)dmgCracker is better because:Multi-threaded, and allows for multiple dictionary files to be tested (increases chances of finding password).Uses 'verify' and not 'attach' subprocess for faster password checking.Runs about 55 passwords per second with 128bit encryption.Runs about 3.6 passwords per second with 256bit encryption.
LEGAL NOTE: This program was created for the intention of cracking my own .dmg image which I had locked myself out of. I do not suggest using this program for illegal purposes such as opening .dmg images that you are not allowed access to and that you do not own yourself.
If you require a wordlist-generator, I also wrote a program to do this as well.
To run, you must have a encrypted dmg file in the same folder, and at least 1 passphrase file containing a dictionary. (a list of words)
Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |