Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 1 Mar 2018 14:51:42 -0500
From: Ian Boyd <ibkid@...us.net>
To: john-users@...ts.openwall.com
Subject: Re: dmg file with lost password

HI Alexander,

I tested a dmg file with a weak password and it took like 2 seconds to crack. So I’m hoping, knock on wood, that the results are the same for my dmg file.
I know it was a longer password with both upper and lower case, but even if the word shows up I can try different variations of it. Fingers Crossed.

Ian

> On Feb 27, 2018, at 5:19 PM, Solar Designer <solar@...nwall.com> wrote:
> 
> On Tue, Feb 27, 2018 at 05:06:50PM -0500, Ian Boyd wrote:
>> Is this the information you are looking for regarding showing the full output?
>> 
>> 
>> [22:37:12] /Users/ianboyd/Downloads/john-1.8.0.9-jumbo-macosx_v3/run/john --format=dmg-opencl --single --session=/Users/ianboyd/.john/sessions/02-24-18-22-37-12 /Users/ianboyd/Desktop/Johnny files/dmgpass.lst
>> Device 1: Intel(R) Iris(TM) Graphics 6100
>> Using default input encoding: UTF-8
>> Loaded 1 password hash (dmg-opencl, Apple DMG [PBKDF2-SHA1 OpenCL 3DES/AES])
>> Will run 4 OpenMP threads
>> -------------------------------------
>> [22:38:35] /Users/ianboyd/Downloads/john-1.8.0.9-jumbo-macosx_v3/run/john --restore=/Users/ianboyd/.john/sessions/02-24-18-22-33-44
>> Loaded 1 password hash (dmg, Apple DMG [PBKDF2-SHA1 256/256 AVX2 8x 3DES/AES])
>> Will run 4 OpenMP threads
>> Proceeding with single, rules:Single
>> Press 'q' or Ctrl-C to abort, almost any other key for status
>> 0g 0:00:02:05 22.65% 1/3 (ETA: 22:45:42) 0g/s 87.55p/s 87.55c/s 87.55C/s Users/users/ianboyd/desktop/files/information.dmgs
>> Proceeding with wordlist:/Users/ianboyd/Downloads/john-1.8.0.9-jumbo-macosx_v3/run/password.lst and rules:Wordlist
>> Proceeding with incremental:ASCII
> 
> Yes, and this looks reasonable. :-)
> 
> Current versions of JtR may also print a message like:
> 
> Cost 1 (iteration count) is 234567 for all loaded hashes
> 
> Is this not printed for you?  Looks like it is not, which surprises me.
> 
> Anyway, you'll want to proceed with that test with a dmg file having a
> known weak password.  Not only to verify your procedure (per the above,
> it looks correct to me), but also to test software compatibility
> (although ideally you'd generate the test dmg file on the same version
> of OS X that was used to generate your target dmg file).
> 
> Alexander


Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ