|
|
Message-ID: <loom.20140821T212023-172@post.gmane.org>
Date: Thu, 21 Aug 2014 19:52:42 +0000 (UTC)
From: Jasper <iteks@....com>
To: john-users@...ts.openwall.com
Subject: Need help cracking the hash output from dmg2john
I am not a hacker/cracker, well the second is debatable since I am white.
But please forgive my ignorance or lack of proper vernacular that you pros use.
I am computer literate,
done some web programming and network admin and I'm a quick learner.
However, this cracking stuff is certainly not in my area of knowledge.
Please help, I think I'm off to a
good start already.
Heres the deal.
Forgot the pw of a secured DMG.
I have a few ideas of some string combos.
First, I used JTR and dmg2john to get a dmg.txt hash file.
Now, I want to apply what I know of the pw to a wordlist dict and/or rules.
I think it would be best to use a combinator attack,
but I don't see how JTR allows the use of 2 lists.
If JTR can do this please advise.
If not, then it'd be great if I could generate a single list
from the 2 lists that would normally be used as a combinator attack.
Here's what I know so far:
1. There is a alpha word between 4 and 7 chars
(I have some possibles in mind).
2. There is a separator between 1 and 3 chars
(i.e. 1 char space containing a single number from 0-9
or 3 char spaces with space 1 and 3 containing "+" with
a number ranging from 0-9 in the middle).
3. There is a final word between 4 and 6 chars
(I have some possibles in mind).
In theory the first wordset is in a wordlist-1.txt,
the second wordset is in a wordlist-2.txt and the
separator could be written as an incremental rule.
I may be way off track and you all might be peeing your pants laughing,
however, I just need your help.
Tell me what to do or what you think should be done.
Thanks in advance guys.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.