Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 20 Feb 2014 11:54:36 -0800
From: Jeff Keller <jakeller@...r.com>
To: <john-users@...ts.openwall.com>
Subject: Re: Need assistance with encrypted Time Machine sparsebundle

 

On 02/20/2014 11:39, magnum wrote: 

> On 2014-02-20 19:46, Jeff
Keller wrote:
> 
>> On 02/20/2014 09:21, magnum wrote: 
>> 
>>> JtR Pro
can't crack a dmg afaik. You need to build from
>> bleeding-edge 
>>

>>> source available at GitHub. magnum
>> Huh, from reading this:
http://blog.whitehatsec.com/cracking-aes-256-dmgs-and-epic-self-pwnage/
[1] I was under the impression that the "off the shelf" version of JtR
could do it. I did reach out to the guys mentioned in the article
(Stricture) but haven't heard back yet. This is sort of the digital
version of your house burning down! Hope someone can help out.
> 
> Just
download a snapshot tarball from 
>
https://github.com/magnumripper/JohnTheRipper/tarball/bleeding-jumbo [2]
and 
> build it. To build you will need to have Xcode installed, I
believe 
> that's free from Appstore. Feel free to ask specific
questions.
> 
> magnum

Ok, downloaded jumbo and Xcode. I saw this in
the INSTALL file:

UPDATE: It seems OS X 10.9 Mavericks (and on,
hopefully) can build the
-native target without any external tools or
tricks. However, the above
instructions (using a real gcc as opposed to
Apple's llvm-based one) may
still result in a slightly better performing
build. 

I assume I still need to compile it? I'm a bit rusty in that
department... what do I need to do to compile it? Just "make clean
macosx-x86-64-native"? 

>From there it looks like I run dmg2john and
then start cracking (that's another thing I will need help with).


Thanks magnum! 

---
Jeff Keller
Senior Writer, dpreview.com



Links:
------
[1]
http://blog.whitehatsec.com/cracking-aes-256-dmgs-and-epic-self-pwnage/
[2]
https://github.com/magnumripper/JohnTheRipper/tarball/bleeding-jumbo

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ