Date: Mon, 7 Apr 2014 13:35:55 +0000 From: genough <genough@...e.com> To: john-users@...ts.openwall.com Subject: Re: Great News - photos recovered! The link is dead....mail me the hash k -------- Original message -------- From: Jeff Keller <jakeller@...r.com> Date: To: john-users@...ts.openwall.com Cc: magnum <john.magnum@...hmail.com> Subject: Re: [john-users] Great News - photos recovered! Yep, it worked! "Cracked /Volumes/Time Machine/Jeff's 12-Core Mac Pro.sparsebundle/bands/0" Thanks everyone! Jeff On Apr 5, 2014, at 1:10 PM, Michael Ledford <mledford@...il.com> wrote: > Hi Jeff, > > Congratulations! Did you happen to check to see if john was given the > actual password that it shows as a positive result? > > Cheers, > Michael > > > On Thu, Apr 3, 2014 at 12:36 AM, Jeff Keller <jakeller@...r.com> wrote: > >> While diving through my file cabinet I found the password for my Time >> Machine backup in a place where it should not have been! So my backup, >> complete with 15+ years of photos, has been saved! >> >> I did use the style I described originally, just a pair of words that I >> hadn't used before. If you have the hash file still and want to see if you >> can crack it with an extra hint, let me know. >> >> Thanks for everyone who tried to crack the password, and to magnum for >> helping me get up and running. >> >> Best, >> Jeff >> >> On Mar 8, 2014, at 12:43 PM, Jeff Keller <jakeller@...r.com> wrote: >> >>> Thousands of my treasured photos are stuck on an encrypted sparsebundle >> DMG file from a Time Machine backup. I've worked with magnum to gain >> support for the format and extract the hash (thanks magnum!), but neither >> of us have been able to get the password. >>> >>> I'm offering $3000 (via Paypal) to whomever can crack the code so I can >> retrieve the contents. I work for DPReview.com (world's largest digital >> photography site, owned by Amazon) and formerly ran DCResource.com for 15 >> years, so I'm actual employed person who can pay the reward. My employer is >> not involved in this project. >>> >>> The password is NOT a random string of characters. It's likely common >> words (which I've provided via the link below) with certain characters >> swapped out. It's probably between 6-12 characters. >>> >>> My common substitutions: >>> 1 -> ! >>> O -> 0 (letter to number) >>> two -> 2 >>> four -> 4 >>> >>> You can download the hash and some possible hint words at this link: >>> [link dead] >>> >>> Let me know if you have any questions. If anyone can crack this one >> open, I will be forever in your debt! >> >> >> --- >> Jeff Keller >> Senior Writer, Digital Photography Review >> www.dpreview.com >> >> --- Jeff Keller Senior Writer, Digital Photography Review www.dpreview.com
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.