[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 14 Jul 2012 17:25:06 +0200
From: buawig <buawig@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Re: 1.7.9-jumbo-6: cracking firefox/thunderbird/seamonkey
non-hashes
> Can you try using the "pfx" format in JtR to crack .p12 files and
> report back if it works or not?
>
> Steps:
>
> 0. Compile latest JtR-jumbo
> 1. Run "pfx2john filename.p12 > pfxhashes"
> 2. Run john on pfxhashes file.
I created a testfile and protected it with the password 12345678,
then I tested pfx2john and john on the pfxhashes file successfully:
./john pfxhashes
Loaded 1 password hash (pfx [32/64])
12345678 (test.p12)
guesses: 1 time: 0:00:00:12 DONE c/s: 958 trying: 12345678
Use the "--show" option to display all of the cracked passwords reliably
thanks!
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ